Home
Jobs

498 Security Engineering Jobs - Page 16

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 5.0 years

0 - 0 Lacs

Bengaluru

Work from Office

Naukri logo

About Information Security Group (ISG) Tredence CISO's office is accountable for Security and Privacy on all aspects of Tredence's internal and Client facing business. The team in charge of Security - the Information Security Group (ISG) - focusses on all elements of Information Security for the organization working collaboratively with stakeholders from across its business. The team provides internal as well as external stakeholders assurance while confidential data is being handled to meet business objectives. ISG takes care of implementing, maintaining and reporting of Information Security and its posture using a combination of Policies, Procedures, Guidelines and Cyber Security technology controls on an ongoing basis. The team comprises of two Groups, 1. Cyber Security Governance, Risk and Compliance (GRC) and, 2. Cyber Security Technical Operations (TechOps) Responsibilities o In this role in SecArch (under the TechOps group), you will partake in strategizing and handling of initiatives related to building and keeping up-to-date all relevant Technical Security Standards (e.g.: Hardening Standards, Encryption Standards etc.) as well as build and maintain the Security Architecture artifacts (e.g.: Framework etc.), and help evolve the Security Architecture and Cyber Security maturity of the Organization o You will review and sign-off on all relevant IT and IoT changes which can influence the Security Architecture as well as manage exceptions to the same o You will track and extend / revoke exceptions in a timely manner so as to ensure exceptions are only utilized on a business-need-to-have basis o You will handle supplier technical security due diligence of the products and/or services so as to ensure the assessee has apt set of technical controls as desired - with respect to Confidentiality, Integrity and Availability - before being contracted for work / use with the organization; and similarly in M&A initiatives as and when applicable o You will maintain a constant view of the current security state in the organization so as to ensure adequacy and coverage of technical security controls in the organization o You will handle initiatives pertaining to systematic detection and mitigation of technical control gaps across the organization on an ongoing basis o From a Security Engineering standpoint, you will partake in the development and implementation of the Security Engineering program in which various implementations of Cyber Security technologies will be undertaken to help protect the organization from Cyber Threats from time to time o You will work with Security Vendors from initial expectation conversations, RFPs, functional requirements, proof of concepts (POCs) and vendor short listing, UAT, production rollouts, product or platform upgrades as well as ongoing maintenance as required o You will keep abreast with the latest events pertaining to the Global Cyber Security Threat landscape so as to consider critical Cyber Security stack upgrades for the organization on priority o You will ensure control coverage and effectiveness in all solution rollouts in a systematic fashion o You will work closely with Security Architecture team and other relevant stakeholders to obtain a clear understanding of the current Cyber Security posture of the organization and control gaps to help derive the required Security Engineering Strategy and implementation of the same o You will assist the team in handling Cyber Security budgets for the CISO Office through its entire lifecycle from budget proposals, approvals and periodic tracking and reporting Knowledge expectations o You come with up to 5 years of hands-on working experience in Information Security o You have good knowledge of various latest Cyber Security technology controls (e.g.: SASE, CASB, anti-APT, EDR, XDR, SIEM, SOAR, UEBA, Threat Hunting, WAF, Firewalls, anti-DDoS, PIM-PAM, Attack Surface Monitoring (ASM) technologies etc.), Enterprise Security Architecture, Cyber Resilience, Cloud Security Strategy and roadmap, and Security Standards not withstanding its applicability on-prem, on-cloud, mobile or on IoT infrastructure paradigms o You have basic knowledge in various topics in the following areas, such as but not limited to application of Security to Systems, Storage, Compute, Cloud, Networks, Virtualization, Software and OT o You have a fundamental knowledge of applying essential security controls in one or more of the following Cloud platforms - Microsoft Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP) o You have a basic understanding of various Security Standards and Frameworks such as, but not limited to, Information Security Management System (ISO 27001), Business Continuity Management System (ISO 22301), NIST Cyber Security Framework (NIST), NIST 800-53, PCI DSS, HIPAA, SSAE-18 SOC 1 or SOC 2 and SoX controls Required education and certifications o You are an Engineering graduate, have an equivalent or higher education o You have acquired one or more of the following certifications - CISSP, CISM, CCSP, ISO 27001 Lead Implementer / Auditor, Azure, AWS and GCP Certifications Skill expectations and others o You have great attention to detail, strong communication and collaboration skills o You come with a mix of technical, analytical and problem-solving skills o You come with a mindset of helping improve the Information Security Program at all times o You are an avid learner which you continuously look at imbibing and applying on the job o You are a self-starter, a go getter and an innovative thinker with a positive attitude Required Skills

Posted 1 month ago

Apply

3.0 - 6.0 years

6 - 15 Lacs

Mumbai

Work from Office

Naukri logo

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role At Kyndryl, our Security Consultants are game-changers, constantly pushing the boundaries of what's possible and transforming the way our customers do business. We're looking for a talented individual who thrives in a dynamic environment and is ready to take on the challenge of protecting organizations from threats both known and unknown – being the defender of tomorrow’s digital world. As a Security Consultant, you'll be the guardian of confidentiality, integrity, and availability, ensuring organizations are shielded from the ever-evolving threat landscape. Your expertise will be sought after as you assess, analyze, and implement effective security measures in customer environments, leaving no stone unturned when it comes to safeguarding their most sensitive data. Collaboration will be your forte, as you work closely with clients to understand their unique security requirements and assess their current security posture. Armed with this knowledge, you'll provide expert guidance and recommendations on the best security practices, risk management strategies, and robust security policies that will fortify their defenses. You won't stop at providing advice; you'll roll up your sleeves and get hands-on. Designing and implementing security controls, policies, and procedures will be your playground. You'll work alongside cross-functional teams to deploy state-of-the-art technologies, including firewalls, intrusion detection/prevention systems, access controls, and encryption technologies, ensuring a comprehensive security framework. The thrill of uncovering vulnerabilities and risks is what motivates you. Armed with your extensive knowledge, you'll conduct thorough security assessments, leaving no stone unturned in identifying potential security breaches. Your findings will serve as the foundation for meticulous security audits and reviews, ensuring adherence to policies and procedures. Your reports and findings will be the catalyst for management decisions and actions. In the fast-paced world of cybersecurity, staying ahead of the game is crucial. That's why you'll continuously immerse yourself in the latest security threats, technologies, and best practices. Your recommendations will drive enhancements to the organization's security posture, ensuring it remains at the cutting edge of defense. Your influence won't be limited to systems alone. You'll lend your expertise to the design and review of IT infrastructure, systems, and applications, ensuring they are secure by design from inception. Not only will you make an impact within our organization, but you'll also collaborate with customers and vendors on security assessments, audits, and due diligence activities. Your knowledge and experience will be instrumental in shaping secure collaborations and partnerships. Our consultants are restless for innovation. They are at the edge of technology, changing the way our customers implement business solutions – so, if you’re a problem-solver, an innovative thinker, and a self-starter with a passion high impact assignments which align technology to business outcomes, then we want to hear from you! Apply today to join our team that has a host of exciting projects and customers waiting for you to work with them to solve complex transformation puzzles through technology. Your Future at Kyndryl As a Security Consultant at Kyndryl you will join the Kyndryl Consultant Profession, working with other Kyndryl Consultants, Architects, Project Managers, and cross-functional Technical Subject Matter Experts – presenting unlimited opportunities with unmatched support through our investment in your learning, training, and career growth Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Experience Any Professional level active certification from OEM (F5, Citrix) Hands on experience Citrix Net scalar and F5 Devices Experience on F5 Products (LB and WAF) Good Knowledge and Hands on Static and Dynamic Routing protocol: (BGP, EIGRP, OSPF) and failover concepts. Knowledge and hands on LTM/GTM, GSLB, HA, Cloud XC concepts. Experience on ASM will be preferred. Knowledge of SSL offloading and understanding of OWASP waf. Work from client location in Airoli, Navi Mumbai. 24*7 shift operations Implementing change request w.r.t LB and WAF technology Configure and troubleshoot Load balancer and WAF devices Troubleshooting severity issues Attending client meeting of change discussions. Support in providing RCA. Understanding vulnerability assessment and security hardening process. Minimum 6-8years of experience. Attend and able to participate in architecture discussion. Implement and troubleshoot network and security protocols Understanding of ITIL concepts. Experience in ticket handling through service now.\ The Operations Engineer will offer Level 2 and Level 3 Support that includes operation and change management. Understanding and daily use of Microsoft Office 365 Suite and other productivity tools (e.g., Excel, Word, PowerPoint, SharePoint) to accomplish audit and compliance related tasks). Preferred Technical and Professional Experience Application Centric Infrastructure (ACI) deployment and data center experience Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 1 month ago

Apply

3.0 - 7.0 years

15 - 19 Lacs

Bengaluru

Work from Office

Naukri logo

locationsIndia, BangaloreMalaysia, Penang time typeFull time posted onPosted 30+ Days Ago job requisition idJR0269409 Job Details: About The Role : As PAM Engineer it will need CyberArk and Conjur Role and Responsibilities Hands on experience in Installing, Upgrading and Setting up CyberArk EPM, CPM, PSM, PSMP, AIM to Customizing, configuring it for given Policies and procedures. Hands-on experience in Installing and Setup CyberArk Conjur Enterprise Hands on experience in integrating Conjur with Jenkins, GitHub Action Kubernetes. Strong Knowledge in Docker Container management. Good Knowledge in Linux administration and Patching Design, architecture, and migration experience on Cyber Ark Provisioning, creating workflows, custom connectors, policies Integrating various platforms with Cyber Ark, such as different LDAP providers, Windows servers, UNIX servers, Databases, and networking Devices Creation of automation scripts using PACLI and REST API experience on customization of CyberArk Platforms Custom PSM Connectors CPM Plugins with AutoIT Shell Scripting. Good knowledge on auto detection configuration and usage of Discovery Scanning tools. Experience on AIM CP and CCP agents installation and upgradation experience on CyberArk version upgrade experience on DR Drill activities knowledge on HSM and PTA integration would be an added advantage. Qualifications: Knowledge and Skill needed to perform this job: Windows and Linux server management, Proficient in PAM/ Conjur/ CyberArk tools DevOps integration with Jenkins, GitHub , Kubernetes , Puppet, Docker ? Shell scripting Understanding of REST API work model. Education and experience needed to perform this job: Minimum 5-7 years hands on working experience are necessary. Certificates on required skillset like Linux and Conjur etc. will add value. Job Type: Experienced Hire Shift: Shift 1 (India) Primary Location: India, Bangalore Additional Locations: Malaysia, Penang Business group: Intel's Information Technology Group (IT) designs, deploys and supports the information technology architecture and hardware/software applications for Intel. This includes the LAN, WAN, telephony, data centers, client PCs, backup and restore, and enterprise applications. IT is also responsible for e-Commerce development, data hosting and delivery of Web content and services. Posting Statement: All qualified applicants will receive consideration for employment without regard to race, color, religion, religious creed, sex, national origin, ancestry, age, physical or mental disability, medical condition, genetic information, military and veteran status, marital status, pregnancy, gender, gender expression, gender identity, sexual orientation, or any other characteristic protected by local law, regulation, or ordinance. Position of Trust N/A Work Model for this Role This role will be eligible for our hybrid work model which allows employees to split their time between working on-site at their assigned Intel site and off-site. *

Posted 1 month ago

Apply

5.0 - 8.0 years

12 - 16 Lacs

Bengaluru

Work from Office

Naukri logo

Security Risk and Compliance Expert will be instrumental in shaping the global Information Security Management System (ISMS) within our Group Security team. This role involves engaging with various Business Groups and Corporate Functions to identify and manage information security risks, ensuring compliance and enhancing our security posture. Facilitate risk assessments, develop training, and contribute to the continuous improvement of security policies and tools. Enhance the overall security and compliance of services provided to our customers. You have: Master's or bachelor's degree in computer science, security engineering, or equivalent 5+ years of experience in information security in a multinational organization. Solid understanding of information security processes and technologies Practical knowledge of ISO/IEC 27001:2022 standard implementation Excellent documentation and communication skills It would be nice if you also had: Knowledge of security standards like CSA CCM, NIST CSF, NIS2, and SOC2 Experience delivering information security training Familiarity with RSA Archer and Microsoft Power BI or other GRC tools Certifications in information security (e.g., CRISC, CISSP and ISO 27001 LI/LA) Implement and operate the global Information Security Management System (ISMS) to enhance overall security and compliance Conduct risk assessments with global stakeholders to evaluate and report information security risks Develop and maintain the information security risk register, tracking mitigation progress and presenting reports to stakeholders Provide recommendations for security risk mitigation strategies tailored to different business groups Create, update, and maintain ISMS documentation and a repository of reports and audit records Facilitate training sessions to educate employees on ISMS practices and promote a strong security culture Collaborate with cross-functional teams to identify evolving security trends and compliance requirements Contribute to the continuous improvement of Nokia ISMS and related tools, utilizing KPIs to measure effectiveness

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: ForgeRock Identity Manager. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 12.0 years

12 - 17 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Noida

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: PingFederate. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Noida

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: SailPoint Identity Mgmt and Governance. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Hyderabad

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Active Directory. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: GRC Technology. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Coimbatore

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: F5 Load Balancers. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Noida

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

15 - 20 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of the role is to create exceptional architectural solution design and thought leadership and enable delivery teams to provide exceptional client engagement and satisfaction. Do 1.Develop architectural solutions for the new deals/ major change requests in existing deals Creates an enterprise-wide architecture that ensures systems are scalable, reliable, and manageable. Provide solutioning of RFP’s received from clients and ensure overall design assurance Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications in order to better match business outcome objectives Analyse technology environment, enterprise specifics, client requirements to set a collaboration solution design framework/ architecture Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions Clearly articulate, document and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps Evaluate and recommend solutions to integrate with overall technology ecosystem Works closely with various IT groups to transition tasks, ensure performance and manage issues through to resolution Perform detailed documentation (App view, multiple sections & views) of the architectural design and solution mentioning all the artefacts in detail Validate the solution/ prototype from technology, cost structure and customer differentiation point of view Identify problem areas and perform root cause analysis of architectural design and solutions and provide relevant solutions to the problem Collaborating with sales, program/project, consulting teams to reconcile solutions to architecture Tracks industry and application trends and relates these to planning current and future IT needs Provides technical and strategic input during the project planning phase in the form of technical architectural designs and recommendation Collaborates with all relevant parties in order to review the objectives and constraints of solutions and determine conformance with the Enterprise Architecture Identifies implementation risks and potential impacts 2.Enable Delivery Teams by providing optimal delivery solutions/ frameworks Build and maintain relationships with executives, technical leaders, product owners, peer architects and other stakeholders to become a trusted advisor Develops and establishes relevant technical, business process and overall support metrics (KPI/SLA) to drive results Manages multiple projects and accurately reports the status of all major assignments while adhering to all project management standards Identify technical, process, structural risks and prepare a risk mitigation plan for all the projects Ensure quality assurance of all the architecture or design decisions and provides technical mitigation support to the delivery teams Recommend tools for reuse, automation for improved productivity and reduced cycle times Leads the development and maintenance of enterprise framework and related artefacts Develops trust and builds effective working relationships through respectful, collaborative engagement across individual product teams Ensures architecture principles and standards are consistently applied to all the projects Ensure optimal Client Engagement Support pre-sales team while presenting the entire solution design and its principles to the client Negotiate, manage and coordinate with the client teams to ensure all requirements are met and create an impact of solution proposed Demonstrate thought leadership with strong technical capability in front of the client to win the confidence and act as a trusted advisor 3.Competency Building and Branding Ensure completion of necessary trainings and certifications Develop Proof of Concepts (POCs),case studies, demos etc. for new growth areas based on market and customer research Develop and present a point of view of Wipro on solution design and architect by writing white papers, blogs etc. Attain market referencability and recognition through highest analyst rankings, client testimonials and partner credits Be the voice of Wipro’s Thought Leadership by speaking in forums (internal and external) Mentor developers, designers and Junior architects in the project for their further career development and enhancement Contribute to the architecture practice by conducting selection interviews etc 4.Team Management Resourcing Anticipating new talent requirements as per the market/ industry trends or client requirements Hire adequate and right resources for the team Talent Management Ensure adequate onboarding and training for the team members to enhance capability & effectiveness Build an internal talent pool and ensure their career progression within the organization Manage team attrition Drive diversity in leadership positions Performance Management Set goals for the team, conduct timely performance reviews and provide constructive feedback to own direct reports Ensure that the Performance Nxt is followed for the entire team Employee Satisfaction and Engagement Lead and drive engagement initiatives for the team Track team satisfaction scores and identify initiatives to build engagement within the team Mandatory Skills: Embedded Security Engineering. Experience8-10 Years.

Posted 1 month ago

Apply

4.0 - 9.0 years

19 - 22 Lacs

Hyderabad

Work from Office

Naukri logo

Job Area: Information Technology Group, Information Technology Group > Cyber Security Engineering General Summary: PeopleThis role is a combination of 'Data Loss Prevention (DLP) & security orchestration lead in Cyber Defense Center which operates 24x7 thus requires being available on call during weekends and off hours including night shift to support the business requirements of the organization.People management is essential to this role.Continuous focus on upskilling the CDC analysts to keep them upskilled in automation and in 'Data Protection'.Mentor the team to innovate solutions, also improve DLP investigations and operational efficiency.Help drive lower attrition using direct engagement methods like 'Rewards and Recognition' and other indirect engagement methods to retain staff.Ensure maximum coverage and efficient operations.ProcessManage the KPIs, operational deliverables, problem management & operational excellence.Maintain accuracy in DLP escalations to drive 'Zero Tolerance for Errors'.Lead the Shift Handovers & assist the team with direction to investigate key DLP alerts.Actively participate in the stakeholder meetings to review the escalation of Company Confidential Information (CCI) triggered from DLP team.Look for opportunities to gather patterns, anomalies from SOC escalations and drive feedback with relavent stakeholders on preventative measures to bolster the Data Loss Prevention (DLP) policies.Align with the CDC maturity roadmap on innovation and assign priorities for implementation.Drive enforcing and or governing the escalation process between CDC analysts and Cyber Investigations Team (CIT).Accountable for meeting the SOC KPIs that includes "Time Savings by Automaiton", "Quality Accuracy', 'Acknowledgement Time', 'Time to Escalate' & 'Resolution Time'.Synergies with cross-functional teams across Qualcomm.Technology and engineeringLook for opportunities to drive innovation within Cyber Defense Center. Leverage AI/ML to mature the current automation to become a NexGen capability center.Mature automation processes and capabilites to perform faster and more efficient responses leveraging automation and orchestration.Look for opportunities to gather patterns, change in CCI violation channels, techniques, anomalies from CDC investigations and drive feedback with relavent stakeholders on preventative measures. Minimum Qualifications: Bachelor's degree in Engineering, Information Systems, Computer Science, or related field and 3+ years of cybersecurity-relevant work experience. OR High School diploma or equivalent and 5+ years of cybersecurity-relevant work experience. Physical Requirements: Frequently transports and installs equipment up to 40 lbs. 8+ years of proffessional experience in IT with prior experience in automation & people managementThe individual must have a strong knowledge on programming skills, delivered automation projects & good awareness of current and developing security threats and technologies, especially on 'Data Protection'Knowledge on DLP tools is mandatory, while CASB is essentialStrong proficiency in DLP investigations, also in written and spoken EnglishExcellent Problem Solving and Critical Thinking SkillsStrong interpersonal skills and a good team playerBachelors degree or Masters Degree in Computer Sciences or in Cyber Security 6 years of 'Information Security' experience & min 3 years of expereience in managing people in 24x7 Security operationsCEH, Security+, OSCP or other industry-relevant cyber-security certifications and ITIL V3.0, 'SAFe Agilist' knowledge is a plus Bachelors Degree in Engineering/Masters in information security Bachelors degree or Masters Degree in Computer Sciences or in Cyber Security CEH, Security+, OSCP or other industry-relevant cyber-security certifications and ITIL V3.0, 'SAFe Agilist' knowledge is a plus Applicants Qualcomm is an equal opportunity employer. If you are an individual with a disability and need an accommodation during the application/hiring process, rest assured that Qualcomm is committed to providing an accessible process. You may e-mail disability-accomodations@qualcomm.com or call Qualcomm's toll-free number found here. Upon request, Qualcomm will provide reasonable accommodations to support individuals with disabilities to be able participate in the hiring process. Qualcomm is also committed to making our workplace accessible for individuals with disabilities. (Keep in mind that this email address is used to provide reasonable accommodations for individuals with disabilities. We will not respond here to requests for updates on applications or resume inquiries). Qualcomm expects its employees to abide by all applicable policies and procedures, including but not limited to security and other requirements regarding protection of Company confidential information and other confidential and/or proprietary information, to the extent those requirements are permissible under applicable law. To all Staffing and Recruiting Agencies Please do not forward resumes to our jobs alias, Qualcomm employees or any other company location. Qualcomm is not responsible for any fees related to unsolicited resumes/applications. If you would like more information about this role, please contact Qualcomm Careers.

Posted 1 month ago

Apply

3.0 - 7.0 years

17 - 22 Lacs

Hyderabad

Work from Office

Naukri logo

Job Area: Information Technology Group, Information Technology Group > Cyber Security Engineering General Summary: PeopleThis role will be responsible for 24x5 in 'Data Loss Prevention (DLP) team in Cyber Defense Center thus requires being available on call during weekends and off hours including night shift to support the business requirements of the organization.People management is essential to this role.Continuous focus on upskilling the CDC analysts to keep them updated with changes in trend in cyber threat landscape, especially in 'Data Protection'.Mentor the team to improve DLP investigations and operational efficiency.Help drive lower attrition using direct engagement methods like 'Rewards and Recognition' and other indirect engagement methods to retain staff.Ensure maximum coverage and efficient operations.ProcessManage the KPIs, operational deliverables, problem management & operational excellence.Maintain accuracy in DLP escalations to drive 'Zero Tolerance for Errors'.Set shift schedules in a rotational basis.Lead the Shift Handovers & assist the team with direction to investigate key DLP alerts.Actively participate in the stakeholder meetings to review the escalation of Company Confidential Information (CCI) triggered from DLP team.Look for opportunities to gather patterns, anomalies from SOC escalations and drive feedback with relavent stakeholders on preventative measures to bolster the Data Loss Prevention (DLP) policies.Align with the CDC maturity roadmap and assign priorities for implementation.Drive enforcing and or governing the escalation process between CDC analysts and Cyber Investigations Team (CIT).Randomly audit the DLP investigations and cascade the feedback to improve operational efficiency.Accountable for meeting the SOC KPIs that includes "Quality Accuracy', 'Acknowledgement Time', 'Time to Escalate' & 'Resolution Time'.Synergies with cross-functional teams across Qualcomm.Technology and engineeringContinous fine tuning of false alarms to improve alert fidelity and reduce the fatigue.Mature automation processes and capabilites to perform faster and more efficient responses leveraging automation and orchestration.Look for opportunities to gather patterns, change in CCI violation channels, techniques, anomalies from SOC investigations and drive feedback with relavent stakeholders on preventative measures. Minimum Qualifications: Bachelor's degree in Engineering, Information Systems, Computer Science, or related field and 3+ years of cybersecurity-relevant work experience. OR High School diploma or equivalent and 5+ years of cybersecurity-relevant work experience. Physical Requirements: Frequently transports and installs equipment up to 40 lbs. 8+ years of proffessional experience in IT with prior experience in people managementThe individual must have a good awareness of current and developing security threats and technologies, especially on 'Data Protection'Knowledge on DLP tools is mandatory, while CASB is essentialStrong proficiency in DLP investigations, also in written and spoken EnglishExcellent Problem Solving and Critical Thinking SkillsStrong interpersonal skills and a good team playerBachelors degree or Masters Degree in Computer Sciences or in Cyber Security 6 years of 'Information Security' experience & min 3 years of expereience in managing people in 24x7 Security operationsCEH, Security+, OSCP or other industry-relevant cyber-security certifications and ITIL V3.0, 'SAFe Agilist' knowledge is a plus Bachelors Degree in Engineering/Masters in information security Bachelors degree or Masters Degree in Computer Sciences or in Cyber Security CEH, Security+, OSCP or other industry-relevant cyber-security certifications and ITIL V3.0, 'SAFe Agilist' knowledge is a plus CDC, SOC, DLP, Data Protection, CASB, Cyber Security Applicants Qualcomm is an equal opportunity employer. If you are an individual with a disability and need an accommodation during the application/hiring process, rest assured that Qualcomm is committed to providing an accessible process. You may e-mail disability-accomodations@qualcomm.com or call Qualcomm's toll-free number found here. Upon request, Qualcomm will provide reasonable accommodations to support individuals with disabilities to be able participate in the hiring process. Qualcomm is also committed to making our workplace accessible for individuals with disabilities. (Keep in mind that this email address is used to provide reasonable accommodations for individuals with disabilities. We will not respond here to requests for updates on applications or resume inquiries). Qualcomm expects its employees to abide by all applicable policies and procedures, including but not limited to security and other requirements regarding protection of Company confidential information and other confidential and/or proprietary information, to the extent those requirements are permissible under applicable law. To all Staffing and Recruiting Agencies Please do not forward resumes to our jobs alias, Qualcomm employees or any other company location. Qualcomm is not responsible for any fees related to unsolicited resumes/applications. If you would like more information about this role, please contact Qualcomm Careers.

Posted 1 month ago

Apply

4.0 - 8.0 years

12 - 22 Lacs

Bengaluru

Work from Office

Naukri logo

Expected Role: Security engineering, security architect, manual security code review, threat modeling, cloud security, application security, product security. Proven experience in cybersecurity with a focus on Cloud security, microservices & API Security, AI security, and Zero Trust Architecture. Proficiency in threat modeling and risk assessments across various domains such as AI, Cloud, Network, Infrastructure, and applications. Expertise in security and network architecture, particularly in securing microservices, APIs & cloud native applications. In-depth experience with securing the SDLC, performing secure code reviews, and analyzing penetration testing reports. Proven track record of enhancing cloud security posture and implementing robust controls. Ability to evaluate and recommend mitigation strategies based on penetration testing and threat analysis. Excellent stakeholder management and communication skills. Ability to work independently, lead projects, and mentor junior team members. Bachelors or masters degree in Cybersecurity, Computer Science, Information Technology, or a related field. Strong knowledge of NIST frameworks (including NIST Cybersecurity Framework, NIST 800-53, NIST RMF), COBIT, ISO/IEC 27001, ISO/IEC 42001 and PCI DSS. Pursue relevant certifications such as CISSP, CCSP, CISM, CISA, CEH, Security+ or industry-specific certifications to enhance cybersecurity proficiency and credibility.

Posted 1 month ago

Apply

3.0 - 6.0 years

3 - 5 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Foundit logo

Responsibilities: Support cross-team security initiatives of internal teams and consult with teams on security in design Engineer and tune the cloud security solutions including but not limited to enrollments, monitoring, alerting and maintaining defined security posture. Designing a secure application-release automation process to make security an integral part of the CI/CD pipelines and Integrate security tools for issue tracking with Jira. Identifying security tools and leading operationalization of solutions from POC to Production. Implementing automation to investigation and response workflows for Automated Incident Response. Reduce time-to-detect and time-to-remediate by driving the automation of applied threat intelligence and sensor enrichment. Work with Architecture teams to Implement a identity management ecosystem holistically and create a secure infrastructure, Enforce compliance with IAM principals including least privilege access, password management, Audit logging, RBAC, deploy and maintain password management, user account lifecycle, certificate management and system authentication solutions improve Web App Firewalls (WAF), Ensure early Identification of intrusion attacks and implement countermeasures Implement security measures that monitor and protect sensitive data and systems from infiltration and cyber-attacks. Work with cloud providers to obtain understanding of security controls, ensure controls are leveraged Develop innovative security controls to protect assets across a complex environment Administer a wide and interesting range of security platforms and systems Implement security orchestration and automation in support of security operations Stay abreast of emerging technologies and threats proactively assess and evaluate the adoption thereof into the organization Act as a first-responder for security-related incidents. Strong commitment to standardization and documentation Skills and Experience Required: At least 5+ years of total experience in Cyber security including Incident response, Engineering, Cloud architectures, Tuning etc At least 3+ years of experience and hands-on expertise in tuning of network sensors like SIEM, DDOS, WAF, Cloud Security and/or Opensource development. Must have proficiency with scripting languages (Batch scripting, Python and Ansible) Must have experience in Monitoring and improving DevSecOps tools and processes, automate routine tasks, improve system reliability and should be from the strong information security background. Must have hand on experience with Linux/Unix systems. Experience in developing and reviewing hardening guidelines for various Linux and Unix Operating systems in line with the industry best practices. Understanding of security frameworks and standards like OWASP NIST, Solid understanding of security protocols, cryptography, authentication, authorization Good understanding of Linux, TCP/IP protocol stack and networking fundamentals, security principles at all layers of the OSI stack Detail understanding of Network Technologies Routers, switches, Load Balancers,firewalls, proxy etc Should have broad technical foundation and be able to understand network, operating system, database and application development design and support as necessary to be able to analyse issues and recommend solutions for the detection, remediation and prevention of security vulnerabilities. Experience in designing and reviewing security controls for Public cloud based deployments Experience of implementing any cloud based SIEM Tools will be an advantage. Experience with PKI, SSL, SSH, HHTPS etc Knowledge of RESTful web services (client server application) Hands on knowledge of Automation skills, Dev-Ops skills etc. Software development domain and principles, including design patterns, code structure, programming languages, continuous integration (Bitbucket), continuous deployment (Jenkins), and deployment orchestration (Puppet, Ansible, or equivalent) Qualifications Bachelor degree in a technical field such as computer science, computer engineering Minimum experience: 10 yrs. in technology field out of which 5-6 yrs in Devsecops

Posted 1 month ago

Apply

9.0 - 11.0 years

37 - 40 Lacs

Ahmedabad, Bengaluru, Mumbai (All Areas)

Work from Office

Naukri logo

Dear Candidate, We are hiring a Data Architect to define and implement scalable data architecture for analytics and AI. Ideal for engineers who love working with data modeling and pipelines. Key Responsibilities: Design data lakes, warehouses, and streaming architectures Define standards for data modeling, ETL/ELT, and storage Ensure data governance, quality, and lineage tracking Collaborate with engineering, analytics, and product teams Required Skills & Qualifications: Strong knowledge of data modeling (OLAP/OLTP), SQL, and NoSQL Experience with big data tools (Spark, Kafka, Snowflake, Redshift) Familiarity with metadata management and data catalogs Bonus: Experience with real-time processing and ML data pipelines Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Reddy Delivery Manager Integra Technologies

Posted 1 month ago

Apply

5.0 - 8.0 years

5 - 8 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Foundit logo

Implement and enforce Secure Software Development Lifecycle (SSDLC) practices across all Whatfix technology projects, ensuring security risks are effectively identified and mitigated throughout development. Conduct Vulnerability Assessment and Penetration Testing (VAPT) for SaaS applications, APIs, and cloud infrastructure, identifying security weaknesses and ensuring timely remediation in collaboration with development teams. Enhance application security by improving secure coding guidelines, integrating security automation, conducting developer training, and defining security metrics. Perform threat modeling using STRIDE to proactively identify security risks in the design phase and recommend effective mitigation strategies. Perform security architecture and design reviews, focusing on core security principles to enhance product security. Work closely with product and solution teams to achieve the objectives of the cybersecurity software security program. Conduct secure code reviews across various programming languages, identifying vulnerabilities and providing actionable recommendations for prevention and remediation. Perform both Manual and Automated Security Testing for identifying application vulnerabilities. Responsible for identifying security vulnerabilities, reporting issues, and collaborating with development teams to ensure timely remediation and closure. Responsible for coordinating and ensuring the successful execution of external VAPT assessments. Responsible for managing and assessing security issues reported through the bug bounty program, ensuring proper triage and remediation. Participate in both internal and external product security audits to ensure compliance and identify security improvements. Conduct and facilitate secure coding training sessions for engineering teams to enhance security awareness and best practices Collaborate with GRC and TPRM teams to align security initiatives with regulatory compliance, third-party risk management (TPRM), and security policies, ensuring adherence to industry standards regulations such as GDPR, ISO 27001, SOC 2, and FedRAMP. Ability to articulate and convey security threats and risks to diverse audiences, effectively emphasizing mitigation techniques and strategies Skills : In-depth knowledge of OWASP Top 10 and CWE 25, with a proven track record of implementing and integrating effective remediation strategies. Possess a strong understanding of microservices, APIs, and web applications, including their security best practices and potential vulnerabilities. Deep knowledge and experience in using SAST, DAST, IAST, SCA and fuzz testing tools. Experience in threat modeling using STRIDE, identifying potential security risks and implementing effective mitigation strategies. Knowledge of RESTful web services (client server application) Hands-on experience with automation and DevSecOps practices to enhance security integration in development workflows. Proficiency in high-level programming languages such as Java and .NET, with additional expertise in DAST code reviews as a plus. Strong understanding of SDLC methodologies, with flexibility to work in Agile environments. Proven experience in providing technical oversight to project team members, ensuring engagement quality and adherence to security best practices. Familiarity with code management systems (e.g., BitBucket), CI/CD pipelines (e.g., Jenkins), containerization (Docker, Kubernetes), microservices architecture, and authentication frameworks like OAuth 2.0 and OpenID Connect. Well-versed in both waterfall and agile development models, with experience embedding secure development practices in both. Extensive experience in driving and implementing Secure SDLC (SSDLC) practices, ensuring seamless security integration into the development process. Proficient in at least two scripting languages, such as Python, Perl, PHP, or Ruby. Experience in performing static code analysis using tools like Checkmarx, Github advanced code security to identify security vulnerabilities. Qualifications: Qualification Required: Bachelor/Master Degree in either Computer Engineering or Information science Preferred certifications: OSCP, CEH, ECSA, or other industry-recognized security certifications. Minimum experience: 5-8 years of experience in Product Security

Posted 1 month ago

Apply

8.0 - 12.0 years

19 - 21 Lacs

Bengaluru

Work from Office

Naukri logo

Responsibilities: * Design, implement, and maintain secure solutions on AWS cloud platform using IAM and security architecture principles.

Posted 1 month ago

Apply

2.0 - 6.0 years

4 - 8 Lacs

Pune

Work from Office

Naukri logo

NetSPI is the proactive security solution used to discover, prioritize, and remediate security vulnerabilities of the highest importance We help secure the most trusted brands on Earth with our Penetration Testing as a Service (PTaaS), Attack Surface Management (ASM), Cyber Asset Attack Surface Management (CAASM), and Breach and Attack Simulation (BAS) solutions Leveraging a unique combination of dedicated security experts, intelligent process, and advanced technology, NetSPI brings a proactive approach to cybersecurity with more clarity, speed, and scale than ever before, NetSPI is on an exciting growth journey as we disrupt and improve the proactive market security We are looking for individuals with a collaborative, innovative, and customer-first mindset to join our team Learn more about our award-winning workplace culture and get to know our A-Team at netspi /careers, Responsibilities: Innovation: Stay at the forefront of security technology and trends Partner with research and engineering teams to define and prototype scalable solutions that identify and mitigate risk to our customersenvironments, Product Design: Collaborate with product managers to identify capability gaps, define new features, and inform and advance differentiation and customer value in our security products, Security Detection Ownership: Author, test, deploy and maintain ASM security detections Drive Unique Insights: Leverage our existing data to identify new patterns, correlate them with existing information, and enrich our security products with these insights Quality Assurance: Conduct thorough testing and validation to ensure the security and reliability of products, Customer Support: Provide technical support and guidance to customers regarding security products and features, Minimum Qualifications: A bachelor's degree in computer science or a related field or applicable work experience 2+ years of experience in penetration testing or security engineering Hand-on experience in one of the cloud providers (AWS, Azure or GCP) and able to drive security discussions, Proficiency in programming languages such as Java, Golang, Python, or similar, Experience designing and integrating RESTful APIs Experience with agile development methodologies, Excellent debugging, security communication and interpersonal skills, Preferred Qualifications: Cyber asset management product development experience Hand-on experience on AWS, Azure and/or GCP Developed security products/tools that meet customer needs Professional certifications or demonstrable comparable experience Familiarity with DevOps practices and tools We are an equal employment opportunity employer All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status or any other characteristic protected by law,

Posted 1 month ago

Apply

8.0 - 13.0 years

25 - 30 Lacs

Bengaluru

Work from Office

Naukri logo

Kaseyais the leading provider of complete IT infrastructure and security management solutions for Managed Service Providers (MSPs) and internal IT organizations worldwide powered by AI Kaseyas best-in-breed technologies allow organizations to efficiently manage and secure IT to drive sustained business success Kaseya has achieved sustained, strong double-digit growth over the past several years and is backed by Insight Venture Partners insightpartners ), a leading global private equity firm investing in high-growth technology and software companies that drive transformative change in the industries they serve, Founded in 2000, Kaseya currently serves customers in over 20 countries across a wide variety of industries and manages over 15 million endpoints worldwide To learn more about our company and our award-winning solutions, go to Kaseya and for more information on Kaseyas culture, please click here: Kaseya Culture, Kaseya is not your typical company We are not afraid to tell you exactly who we are and our expectations We have achieved record levels of success being BOLD, being GRITTY, being ACCOUNTABLE The thousands of people that succeed at Kaseya are prepared to go above and beyond for the betterment of our customers, and the betterment of their careers and long-term financial wealth, Role: Senior DevOps Engineer Duration: Full-Time Timings: 1PM 10 PM IST Experience: 8+ yrs Work Mode: Completely Onsite (No Hybrid/ Remote model) Skills to crack: Azure-powered infrastructure; Governance Framework; Architecture Security; Organizing Tenants; Managing Tickets, About Kaseya: Kaseya is the leading cloud provider of IT systems management software, offering a complete IT management solution delivered both via cloud and on-premises Kaseya technology empowers MSPs and mid-sized enterprises to proactively manage and control their IT environments remotely, easily and efficiently from a single platform Kaseya solutions are in use by more than 10,000 customers worldwide in a wide variety of industries, including retail, manufacturing, healthcare, education, government, media, technology, finance, and more, The company was founded in 2000 and is privately held with a presence in over 20 countries To learn more, please visit http:// kaseya Job Profile: We are seeking a highly skilled and experienced Azure Cloud Engineer to join our team, The ideal candidate will be responsible for providing expert guidance, developing tooling, and implementing best practices to ensure our Azure infrastructure is reliable, secure, and optimized for performance and cost, This role will require a deep understanding of Azure services, extensive hands-on experience, the ability to mentor peers and collaborate across cross-functional teams, and a passion for driving complex projects to completion, Responsibilities: Design and implement Azure-based solutions and patterns using prescribed best practices, Facilitate project and initiative execution through collaboration with product teams, Refine the tenant/subscription onboarding processes and operational readiness reviews, Enhance current processes for account management/organization, provisioning, and governance, Provide cloud financial management support, such as working with product teams to identify cost optimization opportunities, and contributing to consumption and MACC discussions, Participate in technical committees involved in standardizing public cloud best practices, Implement and help enforce security processes and policies in conjunction with our security teams to ensure adherence to best practices, guidelines and compliance regulations, Help ensure adherence to data protection and privacy regulations, Provide guidance and recommend solutions in implementing service availability and performance monitoring, Skills and Experience: 8+ years progressive experience building and supporting Azure-powered infrastructure, Outstanding interpersonal and communication skills with the ability to work in a distributed team environment, Ability to communicate at a high level with senior management, Strong problem solving and troubleshooting experience, especially when given vague or limited information, Strong focus on Azure security principles and best practices, including EntraID and Identity and access management Experience designing or reviewing Azure-powered architectures, Experience with cost reduction and consumption model planning, Experience with Active Directory, Experience with IaC tooling such as CloudFormation or Terraform, Proficiency in scripting languages such as Python and Bash, Prior experience mentoring cloud engineers, Experience troubleshooting various Operation Systems, such as Ubuntu, Debian, Windows, etc Working knowledge or certification in the following areas are a big plus: Azure Certification Container technologies such as Docker Experience with CI/CD tooling, Object-oriented programming languages such as Java or C#, Qualifications: Bachelor's degree in computer science, Information Technology, or equivalent work experience Drive cloud initiatives spanning functional areas such as account management and governance, security, cost optimization, modernization, and reliability/performance, Join the Kaseya growth rocket ship and see how we are #ChangingLives ! Additional Information Kaseya provides equal employment opportunity to all employees and applicants without regard to race, religion, age, ancestry, gender, sex, sexual orientation, national origin, citizenship status, physical or mental disability, veteran status, marital status, or any other characteristic protected by applicable law,

Posted 1 month ago

Apply

4.0 - 9.0 years

3 - 7 Lacs

Patancheru

Work from Office

Naukri logo

Security engineer Protect our users and their data. 4+ years in security engineering. Encryption expertise. Threat modeling experience.

Posted 1 month ago

Apply

6 - 10 years

12 - 17 Lacs

Gurugram

Work from Office

Naukri logo

Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies