Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 9.0 years
0 Lacs
delhi
On-site
As a Threat Analyst, you will play a crucial role in proactively analyzing and mitigating cyber threats to protect the organization's information assets. Your primary responsibilities will include coordinating, validating, and managing cyber threat intelligence sources, identifying information gaps in threat intelligence, monitoring and reporting on validated threat activities, and providing real-time cyber threat intelligence analysis during cybersecurity incidents. You will also be responsible for analyzing security events, logs, and alerts to identify potential threats, conducting threat research to stay updated on the latest threats, and developing threat intelligence reports for various audiences. Collaboration with other security teams, participation in security incident response activities, and the development and maintenance of security policies and procedures will be key aspects of your role. Additionally, you will be expected to contribute to vulnerability assessments, penetration testing, and the development of detection rules and signatures for security tools. A strong understanding of cyber threats, attack vectors, and mitigation techniques, as well as familiarity with security technologies and tools, will be essential in successfully fulfilling your responsibilities. The qualifications for this role include a Bachelor's degree in Cybersecurity, Information Security, Computer Science, or a related field, along with a minimum of 5-8 years of experience in a cybersecurity role focusing on threat intelligence or security analysis. Possession of cybersecurity certifications such as Certified Threat Intelligence Analyst (CTIA), Certified Information Systems Security Professional (CISSP), SANS GIAC certifications, and CompTIA Security+ will be advantageous. Proficiency in threat intelligence concepts, methodologies, and tools, as well as strong analytical, problem-solving, and communication skills, are also required for this position. Preferred qualifications for the Threat Analyst role include a Master's degree in a relevant field, experience with scripting languages like Python and Perl, familiarity with malware analysis and reverse engineering, and knowledge of industry standards and frameworks such as MITRE ATT&CK and NIST. Your ability to work both independently and collaboratively, adapt to a fast-paced environment, and prioritize tasks effectively will be crucial to your success in this role.,
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
chennai, tamil nadu
On-site
As a skilled and resolute Firewall Administrator, you will join our dynamic IT team at Ashley. Your primary responsibilities will include designing, implementing, maintaining, and monitoring our organization's firewall infrastructure. This encompasses on-premises solutions from Palo Alto Networks and Fortinet, as well as cloud-based solutions like Palo Alto Prisma Access. Your key job functions will involve configuring, managing, and maintaining the organization's firewall and Prisma access infrastructure. This includes tasks such as rule creation, modification, and deletion, managing existing firewall infrastructure, monitoring firewall logs and alerts, and ensuring firewall rules are up-to-date and aligned with security best practices. You will also be involved in the implementation and management of VPN solutions for secure remote access. Additionally, you will conduct regular security assessments and vulnerability testing of firewall configurations, stay updated with the latest security threats and technologies, participate in a 24x7 on-call rotation, and contribute to the development and enforcement of security policies and standards. To be considered for this role, you should hold a Bachelor's degree in computer science, Information Technology, or a related field, along with relevant security certifications such as CompTIA Security+, CCNA Security, PCNSA, and Fortinet NSE certifications. The ideal candidate will have a minimum of 3 years of hands-on experience in managing and administering enterprise-level firewalls, a strong understanding of TCP/IP, routing protocols, and network security concepts, and experience with firewall rule configuration and security policy implementation. Proficiency in VPN technologies, network monitoring and security analysis tools, troubleshooting skills, and effective communication and interpersonal skills are also essential for this role. If you possess the necessary skill sets and are enthusiastic about this opportunity, we encourage you to send your profile to vthulasiram@ashleyfurnitureindia.com.,
Posted 1 week ago
6.0 - 10.0 years
0 Lacs
pune, maharashtra
On-site
The role of an Information Security Analyst involves evaluating, testing, recommending, developing, coordinating, monitoring, and maintaining information security policies, procedures, and systems. This includes hardware, firmware, and software to ensure alignment with IS standards and overall IS security. Identifying security risks, exposures, and causes of security violations, as well as suggesting procedures to prevent future incidents are key responsibilities of this role. Investigating and resolving security incidents, recommending enhancements for improved security, and developing techniques for conducting IS security risk assessments and compliance audits are also part of the job description. In this role, you will guide detailed investigations of security issues, review security log data, interpret data to support security event management processes, and triage a wide variety of security events. You will manage incident handling processes, stay updated on new and emerging threats, design and configure security systems, assess threats related to the enterprise, and create cost-effective solutions for system/application development regarding Information Security processes. Moreover, you will perform day-to-day Information Security functions related to computer security software products and processes, work closely with subject matter experts and management, enhance understanding of business objectives, and provide direction based on risk, Corporate Security Policy, and regulatory guidelines. You will also develop long-term strategies for conducting system penetration, vulnerability and web application testing, risk assessments, and policy creation. Minimum qualifications for this role include a Bachelor's Degree and relevant experience or degree in Computer Science, Info Security, or a related field with a minimum of 6 years of relevant experience. Preferred qualifications include professional certifications such as CISSP, CISM, CISA, GSEC, Network+, and Security+. Desired skills and capabilities for this role include having wide-ranging experience, using professional concepts and company objectives to resolve complex issues creatively and effectively. Working on complex issues, exercising judgment in selecting methods, techniques, and evaluation criteria, as well as networking with key contacts outside one's area of expertise are essential. The ability to identify, communicate, and mitigate risk within technical solution designs, continued self-education of new and emerging threats, and relevant processes, controls, or technologies to mitigate them is also crucial. Moreover, knowledge and skills to contribute to all phases of Incident Response are desired for this role.,
Posted 1 week ago
1.0 - 5.0 years
0 Lacs
karnataka
On-site
As an Information Security Entry Analyst at Xylem, you will play a crucial role in safeguarding the organization's data from cyber threats. Your responsibilities will include monitoring security systems, analyzing potential threats, and contributing to the development of security protocols. Under the guidance of senior staff, you will learn best practices to enhance the overall security posture of the company. Your technical responsibilities will involve configuring and maintaining network and system security devices, conducting forensic analysis and incident response, managing security information and event management tools, implementing data loss prevention solutions, conducting web application security testing, managing identity and access management systems, performing security assessments and audits, as well as maintaining security documentation and procedures. In terms of communication responsibilities, you will collaborate with cross-functional teams to identify and mitigate security risks, communicate security incidents and findings to relevant stakeholders, work with external auditors and vendors, participate in security incident response and crisis management planning, communicate security best practices and policies to employees, and establish relationships with security vendors and industry peers. To excel in this role, you should be committed to continuous professional development, demonstrating a willingness to learn, improve, and stay updated on industry trends. Collaboration and teamwork are essential, as you will work effectively with others, contribute to team goals, and appreciate diverse perspectives for better solutions. Your results-driven performance will focus on delivering high standards of work efficiently and effectively. Qualifications for this position include a bachelor's degree in Computer Science, Information Technology, or a related field, or equivalent work experience of 1-2 years with exposure to fundamental theories, principles, and concepts. You should have a basic understanding of information security principles and practices, knowledge of common cybersecurity threats and vulnerabilities, strong analytical and problem-solving skills, experience with database management systems, and the ability to troubleshoot software development issues. Your willingness to work collaboratively with team members and stakeholders, along with good written and verbal communication skills, will contribute to your success in this role. Join the global Xylem team and contribute to innovative technology solutions that transform water usage, conservation, and re-use. Xylem's products impact public utilities, industrial sectors, residential areas, and commercial buildings, providing smart metering, network technologies, and advanced analytics for water, electric, and gas utilities. Partner with Xylem in creating a world where water challenges are met with ingenuity and dedication, recognizing the power of diversity, equity, and inclusion in driving innovation and global competitiveness.,
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
chennai, tamil nadu
On-site
The role of Cybersecurity Specialist based in Chennai is a full-time on-site position where you will be tasked with monitoring and upholding security measures to safeguard computer systems, networks, and information. Your responsibilities will include identifying and mitigating security threats, conducting vulnerability assessments, ensuring adherence to security standards, and crafting security policies. Additionally, you will be required to promptly respond to and handle security incidents, as well as implement security enhancements based on assessment findings. To excel in this role, you should possess knowledge of Cybersecurity principles, vulnerability assessment, and incident response. Proficiency in Network Security, Firewalls, Intrusion Detection Systems (IDS), and Security Information and Event Management (SIEM) tools is essential. An understanding of regulatory compliance requirements such as GDPR, HIPAA, and ISO/IEC 27001 is also crucial. Moreover, skills in programming and scripting languages such as Python, Java, or Bash are highly valued. In addition to technical competencies, strong analytical and problem-solving abilities are key attributes for this role. You should be comfortable working both independently and collaboratively within a team environment. A Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field is required for this position. Possessing relevant certifications such as CISSP, CEH, or CISM would be advantageous.,
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
patiala, punjab
On-site
RBH Solutions Pvt. Ltd. is in search of a proficient Cloud / System Architect to take charge of designing, executing, and overseeing scalable cloud and on-premise infrastructure solutions. Your role entails leveraging your expertise in real-time systems, coupled with a thorough grasp of enterprise deployment frameworks, microservices architecture, and cybersecurity practices. With a minimum of 3 years of hands-on experience in a similar capacity, you will be tasked with delving into AI/ML concepts and their seamless integration into cloud systems. Your familiarity with AI-based tools will play a pivotal role in augmenting coding, testing, automation, and deployment workflows. Moreover, a solid understanding of real-time systems, IoT, and energy management will be advantageous. Your responsibilities will revolve around crafting and overseeing infrastructure spanning virtual machines (VMs), Linux, Windows, and physical servers. By developing and executing enterprise-level cloud strategies and deployment frameworks, you will architect microservices-based solutions catering to real-time database applications. Furthermore, you will be entrusted with offering unified deployment solutions across on-premises, AWS, Azure, and Google Cloud. A critical aspect of your role will involve defining tools and strategies for data ingestion, storage, processing, and analysis. Your ability to optimize system architecture for enhanced performance, cost-efficiency, and scalability will be crucial. Ensuring compliance with project scope, preparing functional specifications, and monitoring cloud infrastructure performance are among the key duties. Security will be a key focus area, where your expertise will be instrumental in contributing to security requirements for RFPs/RFIs. This will encompass various facets such as network security, network access control, data loss prevention, and security information and event management. Upholding system security and data privacy across all infrastructure layers, conducting or supporting cybersecurity testing, and integrating secure-by-design principles throughout infrastructure planning are paramount. Ideal candidates should hold a Bachelors or Masters degree in Computer Science, Information Technology, Electronics, or a related engineering field. Proficiency in Linux, Windows operating systems, strong communication skills for cross-functional collaboration, programming knowledge in Python, C#, and Java are prerequisites. Additionally, a profound understanding of cloud security principles, the ability to automate and integrate IT system processes, and familiarity with PostgreSQL are desirable. This is a full-time position with a day shift schedule based in Patiala, Punjab.,
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
chennai, tamil nadu
On-site
As a Cyber Security Incident Management Operations professional at Standard Chartered Bank, you will be responsible for monitoring, detecting, and responding to potential security threats and risks to the organization using the available technology toolset. Your role will involve correlating and consolidating alerts, reports, anomalies, and other intelligence sources to determine the urgency and priority of events/incidents and initiating an appropriate response. You will continuously work on improving the accuracy and relevance of the bank's detection tools and capabilities to keep pace with changing environments and regulatory/compliance requirements. It will be essential to adhere to defined security monitoring processes and procedures while also driving improvements to enhance maturity and relevance. Tracking and reporting the remediation of cybersecurity threats and risks, as well as providing domain expertise during remediation to the appropriate support groups, will be part of your responsibilities. You will track and document cybersecurity incidents from initial detection through final resolution and operate within established standard operating procedures to handle security incidents effectively. As part of your duties, you will research trends and countermeasures in computer/network vulnerabilities, exploits, and malicious activity. You will support senior incident handlers during cybersecurity incident response activities, perform root cause analyses, and present findings to relevant stakeholders for remediation. Collaborating closely with other support groups to assess risk and provide recommendations for enhancing the bank's security posture will also be a key aspect of your role. In addition to your primary responsibilities, you will be expected to work within a 24x7 shift model and provide after-hours rotational coverage when required. You will play a crucial role in ensuring all potential security threats across the bank are monitored, detected, and responded to promptly to maintain a secure environment. To excel in this role, you should be well-versed in Cybersecurity Incident Analysis and Response as well as Cybersecurity Defensive Operations. A strong understanding of core Enterprise Information Technology and Computer Networking concepts is essential. Exposure to Security Information and Event Management solutions, Endpoint Security tools, and Endpoint Detection and Response tools is desirable. Ideally, you should possess a diploma or higher educational qualification in Engineering, Computer Science/Information Technology, or a relevant discipline. Certifications such as EC Council Certified Ethical Hacker (CEH), SANS GIAC Certified Incident Handler (GCIH), and ITIL v3 Foundation would be advantageous. At Standard Chartered, we value diversity, inclusion, and continuous learning. If you are passionate about making a positive difference in the realm of cybersecurity and are committed to upholding the highest standards of ethics and compliance, we welcome you to join our team and contribute to our purpose of driving commerce and prosperity through unique diversity.,
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
pune, maharashtra
On-site
You are an experienced professional sought by the Security Operations Centre for the SOC Lead position in Pune (Baner). You should possess expertise in SIEM setup, operational knowledge, and cloud environments. The ideal candidate is highly motivated, inquisitive, and adept at problem-solving. A must-have is knowledge of Incident response and SOAR methodologies. Your primary responsibilities include security event monitoring, management, and response. You must have experience with Open Source SIEM Tools, implementation, and at least one Security Information and Event Management (SIEM) solution. Generating reports, dashboards, and metrics for SOC operations, along with presenting to Senior Management, is part of the role. It is essential to have a deep understanding of security threats, attack methods, and the current threat landscape. Proficiency in identifying common attacks and their SIEM signatures is required. Hands-on experience in security monitoring, Incident Response (IR), security tools configuration, and remediation is crucial. Excellent troubleshooting and analytical skills are a must, along with the ability to propose security solutions in business terms. You should be capable of multitasking in a fast-paced environment and have knowledge of containers, orchestration technologies, log parsing, network protocols, and AWS Services for security detection and mitigation. Understanding Operating Systems, Web Servers, databases, and Security devices (firewall/NIDS/NIPS) logs and formats is necessary. With an experience range of 3 - 7 years in IT Infrastructure and Security, you must have prior experience in Cybersecurity & SOC/SIEM, preferably in the Banking and Financial domain. Expertise in Endpoint Security, Network Security, SIEM, SOC Advanced security tools, SOAR platform, Vulnerability Management, SIEM, and building Threat Modeling practice is expected. Strong communication skills are essential for this role. The role offers an opportunity to work with a modern cloud-native security stack, learn and develop in an innovative FinTech environment, receive mentorship and training on advanced threat detection and response practices, be part of a team culture focused on collaboration and technical excellence, and receive a competitive salary and shift allowances.,
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
maharashtra
On-site
As an Individual at Workassist, a leading online recruitment and employment solution platform in Lucknow, India, you will be responsible for ensuring the Cyber Security and IT Risk functions within the Banking industry are effectively managed. Your role will be instrumental in maintaining a secure and compliant environment by assessing risks, designing and implementing security architectures, and staying abreast of the latest security threats and vulnerabilities. Your primary responsibilities will include conducting risk assessments and managing them effectively, designing and implementing security architectures for new projects and systems, and ensuring compliance with ATM standards and regulatory advisories. You will be tasked with updating management on ATM compliance regularly, reporting on ATM logical security and compliance to regulators, and managing security governance with ATM partners. At Workassist, we are dedicated to providing a seamless job search experience for individuals worldwide. With a network of over 10,000+ recruiters, we connect talented job seekers with opportunities in various industries, including Banking & Finance, Consulting, Sales & Marketing, HR, IT, Operations, and Legal. Our goal is to leverage technology to match job seekers with the right employers and enhance the overall job seeking experience. If you are ready to embark on a new challenge, work in a great environment, and elevate your career to the next level, we encourage you to apply today. Visit our website at https://bit.ly/3QBfBU2 to explore this and many other exciting opportunities available on our portal. Join us at Workassist, where we are eagerly awaiting your application!,
Posted 1 month ago
8.0 - 12.0 years
0 Lacs
maharashtra
On-site
As the Head of Technology Infrastructure Security Operations Manager, your primary responsibility is to oversee and lead the security operations team in safeguarding the bank's technology infrastructure. Your key duties include managing the day-to-day operations of the security team, ensuring efficient incident response, and handling security-related incidents and breaches. Collaboration with IT teams to integrate security best practices into the organization's technology infrastructure is crucial. Regular risk assessments and security audits must be conducted to identify potential weaknesses and areas for improvement. Implementing security measures and controls to prevent unauthorized access, data breaches, and cyberattacks is essential. Staying updated with the latest security trends, threats, and technologies is necessary to enhance the organization's security posture continually. Evaluating and selecting security tools, technologies, and vendors that align with the organization's needs and security objectives is part of your role. Managing and monitoring security systems like firewalls, intrusion detection systems, and SIEM tools are vital tasks. Providing leadership, mentorship, and training to the security operations team is necessary to build a strong and capable workforce. Collaboration with other departments and stakeholders ensures security compliance with relevant industry standards and regulations. Reporting security metrics, incidents, and performance to executive management and stakeholders is also part of your responsibilities. Your role is crucial in establishing a robust and proactive security framework to safeguard the organization's technology infrastructure and protect it from potential cyber threats. Skills required for the position of Technology Infrastructure Security Operations Manager include a combination of technical and managerial expertise. You should have a strong understanding of cybersecurity fundamentals, network security, cloud security, operating systems security, vulnerability management, SIEM, incident response, IAM, encryption and cryptography, security auditing and compliance, threat intelligence, security architecture and design, as well as IT governance and risk management.,
Posted 1 month ago
2.0 - 6.0 years
0 Lacs
hyderabad, telangana
On-site
Job Summary: As a Cyber Review Analyst, your primary responsibility will be to conduct cyber security reviews to ensure compliance with security standards and protocols. You will play a crucial role in managing data privacy, responding to security incidents, and collaborating with IT and security teams to implement necessary security measures. Essential Job Responsibilities: You will conduct thorough cyber security reviews to verify compliance with security standards and protocols. In the event of security incidents, you will respond promptly and implement appropriate measures to mitigate risks effectively. Your role will involve managing data privacy and ensuring the protection of sensitive information. Collaboration with IT and security teams will be essential to implement security measures and protocols successfully. Utilizing data analysis, you will identify trends and make informed decisions regarding cyber security strategies. Implementation of security information and event management (SIEM) processes will be part of your responsibilities. Ensuring compliance with cyber security governance and information security standards will be a key focus area. You will provide technical support and apply problem-solving skills to address security-related issues effectively. Qualifications & Requirements: Education: - Required: High school diploma or equivalent. - Preferred: Associate or bachelor's degree in a related field. Experience: - Required: Minimum of 2 years of experience in cyber security or a related field. - Preferred: Experience in a similar role within the IT or security industry. Skills: - Analytical Thinking - Communication - Critical Thinking - Cyber Security Governance - Data Privacy - Detail-Oriented - End-to-End Project Management - High Accuracy - Incident Response - Problem Solving - Security Information and Event Management (SIEM) Certifications: - Required: None. - Preferred: Certification in cyber security or a related field. Physical Requirements: You should be able to work in a fast-paced environment with tight deadlines. Maintaining discretion while handling confidential information is crucial for this role. If you are someone who thrives in a dynamic environment and enjoys collaborating with enthusiastic individuals, then you will find a rewarding career as a Cyber Review Analyst with us.,
Posted 1 month ago
10.0 - 14.0 years
0 Lacs
hyderabad, telangana
On-site
As an Enterprise Security Architect, you will be an integral part of a dynamic organization, taking the lead in developing and overseeing a cutting-edge enterprise security program. Your role will involve identifying, defining, and steering the security technology strategy across a wide range of areas including IAM, Cloud, End Point, Network, and Web security, as well as evaluating new identity technologies at an enterprise scale. Being a senior member of the team, you will collaborate with senior leaders throughout the organization, leveraging your vast experience in security technology management, implementation, and architecture, along with exceptional communication skills to shape strategies, influence roadmaps, drive solution adoption, and advocate for security enhancements that enhance capabilities and reduce risks. Your responsibilities will include defining architectural visions and solutions for complex systems, ensuring alignment with enterprise architecture strategies, and outlining non-functional requirements to support new features and opportunities. You will work closely with stakeholders and vendors to evaluate design decisions and drive best practices and standardized templates within defined domains. In addition, you will create reference architectures and design patterns for endpoint/host and workplace productivity security, contribute to the architecture roadmap, and collaborate with Product Managers/Owners to prioritize technology-focused tasks to enable business features and growth opportunities. Furthermore, you will play a key role in interpreting business and technology drivers to develop security roadmaps, establish data security frameworks, and align technical controls with industry best practices. Your expertise in cloud architecture, access management, monitoring, and other security solutions will be crucial in ensuring the security of company data and systems. To excel in this role, we are seeking individuals who excel in collaboration, prioritize client experience, thrive in fast-paced environments, and are dedicated to continuous improvement. The ideal candidate will possess over 10 years of hands-on experience in architecting IAM solutions, in-depth knowledge of authentication/authorization standards, familiarity with various security tools and platforms, and a strong background in cloud security concepts. Moreover, expertise in security frameworks, data loss prevention, Hybrid cloud architectures, DevSecOps processes, and web application technologies will be highly advantageous. Strong communication skills, the ability to lead technical discussions, and experience in managing stakeholder relationships are also essential qualities we are looking for. If you have a Bachelor's degree in Computer Science, Computer Engineering, or a related field, along with a passion for security architecture and a drive for continuous learning and improvement, we encourage you to apply for this exciting opportunity.,
Posted 1 month ago
2.0 - 6.0 years
0 Lacs
nashik, maharashtra
On-site
About the Company Established in 2011 and headquartered in Mumbai, India, our company is a dynamic and innovative organization specializing in technology solutions. We are committed to delivering world-class services in networking, digital media, and satellite communications, addressing the evolving needs of our customers in the digital age. Work Location: Mumbai Responsibilities As a Network Security Engineer (L2 support), your key responsibilities will include: Deploying and maintaining firewall solutions such as Palo Alto (PA), Check Point, Cisco ASA, and Fortinet. Managing and integrating management tools across Windows, Linux, and Unix environments. Automating processes using scripting languages and Security Orchestration, Automation, and Response (SOAR) tools. Handling incident and problem management activities related to network security. Overseeing day-to-day operations of network security infrastructure, including Business As Usual (BAU) Moves, Adds, Changes, and Deletions (MACDs) and configuration changes. Proactively monitoring network performance to prevent service degradation. Collaborating with Original Equipment Manufacturers (OEMs) for Technical Assistance Center (TAC) support, Return Merchandise Authorization (RMA), and device reconfiguration. Required Skills Proficiency with firewall solutions such as Palo Alto (PA), Check Point, Cisco ASA, or Fortinet. Experience in scripting and process automation. Strong skills in packet capture, analysis, and troubleshooting tools. 2 to 4 years of experience in network security. Familiarity with Windows, Linux, and Unix operating systems. Experience with authentication and authorization tools, including email, Active Directory (AD), Identity and Access Management (IAM), and Security Information and Event Management (SIEM) systems. Relevant product certifications in Palo Alto, Check Point, Cisco ASA, or Fortinet. Excellent verbal and written communication skills. Desirable Skills Problem-solving capabilities across OSI Model layers. Experience with network monitoring and management tools. Experience working in a financial environment. Qualifications Bachelor's degree in Computer Science, Information Technology, or a related field. Product certification in Palo Alto, Check Point, Cisco ASA, or Fortinet. Benefits And Perks We offer a professional work culture with ample learning opportunities, competitive salaries, and benefits including Provident Fund (PF), insurance, paid leave, and more. Company Culture And Mission Our company is driven by passion and takes pride in delivering unique products and value-added solutions in telecom, networking, and media to meet the digital needs of our customers. We foster a vibrant and professional environment dedicated to excellence and innovation.,
Posted 1 month ago
5.0 - 9.0 years
0 Lacs
pune, maharashtra
On-site
Join us as a Senior Cyber Operations Analyst - Cyber Threat Hunting at Barclays, where you will be responsible for supporting the successful delivery of Location Strategy projects. Your role will involve planning, budgeting, ensuring agreed quality, and adhering to governance standards. As a key member of the team, you will lead the evolution of our digital landscape, driving innovation and excellence to provide unparalleled customer experiences. To excel in this role, you should possess the following experience: - Strong analytic skills. - Extensive experience in cyber security, particularly in threat hunting or incident response. - Proficiency in using security toolsets. - Previous exposure to scripting languages and data analysis. - Exceptional interpersonal skills, including the ability to brief, debrief, and present to senior executives effectively, along with active listening skills. - Strong communication skills, both verbal and written, enabling effective interactions with clients, colleagues, and external vendors. - Excellent time management and planning abilities, with experience working under pressure. - Capacity to stay organized and prioritize multiple incident priorities. - High standards of personal integrity, professional conduct, and ethics. - Skills in incident, problem, and change management. Additionally, the following skills are highly valued: - Familiarity with the Financial Services regulatory landscape and compliance issues. - Formal accreditations such as CompTIA Security+ or CISSP. - Proficiency in incident response and change management. Your performance may be evaluated based on critical skills relevant to the role, including risk and controls, change and transformation, business acumen, strategic thinking, digital and technology, as well as job-specific technical skills. The primary purpose of your role is to monitor operational controls" performance, implement and manage security controls, and apply lessons learned to safeguard the bank against cyber-attacks and respond to threats effectively. Key Accountabilities: - Manage security monitoring systems to alert, detect, and block potential cyber security incidents. - Identify emerging cyber security threats and collaborate with networks and conferences to enhance industry knowledge. - Analyze security information and event management systems to detect and prevent potential threats. - Triage data loss prevention alerts to prevent sensitive data exfiltration. - Manage cyber security incidents, including remediation and closure. As an Assistant Vice President, your responsibilities include advising on decision-making, contributing to policy development, and ensuring operational effectiveness. Collaborate with other functions and business divisions, lead a team, set objectives, coach employees, and appraise performance. If in a leadership role, demonstrate LEAD behaviors (Listen and be authentic, Energize and inspire, Align across the enterprise, Develop others). For individual contributors, lead collaborative assignments, guide team members, identify new project directions, consult on complex issues, mitigate risks, and strengthen controls. Collaborate with other areas to keep abreast of business activity and strategy. All colleagues are expected to embody Barclays Values of Respect, Integrity, Service, Excellence, and Stewardship, as well as the Barclays Mindset to Empower, Challenge, and Drive.,
Posted 1 month ago
7.0 - 12.0 years
0 Lacs
haryana
On-site
As Manager / Senior Manager Cloud Security at our company, you will play a crucial role in leading the implementation, monitoring, and enhancement of security architecture and controls across Mobileum's hybrid cloud environments. We are looking for a proactive and hands-on individual who can take ownership, drive solutions, and oversee cloud security programs end-to-end while collaborating effectively across teams to maintain a robust security posture. Your core responsibilities will include evaluating, recommending, and implementing key cloud security solutions such as Cloud Security Posture Management (CSPM), Cloud Workload Protection Platforms (CWPP), Identity and Access Management (IAM), Cloud Access Security Brokers (CASB), Web Application Firewalls (WAF), cloud encryption and key management services, Security Information and Event Management (SIEM), and DevSecOps security automation tools. Your focus will be on strengthening our hybrid cloud security posture across AWS, Azure, GCP, and on-premises environments. You will ensure the effective implementation and continuous improvement of vulnerability management and patching programs, enforce security hardening standards, assess and enhance cloud security controls, drive DevSecOps initiatives, lead investigations and resolution of security incidents, define and report on security metrics and KPIs, support audits, assist in customer security assessments, and undertake additional Information Security projects as required. In terms of stakeholder and collaboration management, you will work closely with various teams including Cloud Operations, IT, Engineering, Product, Legal, SOC, and Business units to align cloud security initiatives with organizational goals. Clear communication of cloud security risks, strategies, and remediation plans to technical teams, senior management, and other stakeholders will be crucial. Collaboration on risk assessments, mitigation strategies, incident response activities, and integration of cloud security monitoring capabilities with the Security Operations Center (SOC) will also be part of your responsibilities. As a leader, you will provide guidance, mentoring, and leadership to the Cloud Operations security team, drive a culture of security awareness, facilitate knowledge sharing, and encourage cross-team collaboration to enhance cloud security maturity. Your work style should be hands-on, proactive, solution-oriented, and focused on delivering practical security solutions aligned with business needs. Strong decision-making and problem-solving skills, along with the ability to work independently and as part of a team, will be essential. In terms of qualifications, we are looking for candidates with 7-12 years of experience in cloud security, hands-on expertise in hybrid and multi-cloud environments, strong technical knowledge of AWS, Azure, GCP, and on-premises security architectures and controls, proven ability to evaluate and implement cloud security technologies and processes, experience managing cloud security metrics, reporting, and audit readiness, excellent communication and stakeholder management skills, and familiarity with DevSecOps and secure CI/CD practices. If you possess a Bachelors or Masters degree in Computer Science, Cybersecurity, Information Technology, or a related discipline, along with the relevant certifications such as CCSP, AWS Certified Security Specialty, Azure Security Engineer Associate, Google Cloud Professional Cloud Security Engineer, CISSP, CISM, CISA, Certified DevSecOps Professional (CDP), or PMP, you are encouraged to apply for this position based in Gurgaon.,
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
At Broadridge, we have cultivated a culture that prioritizes empowering individuals to achieve more. If you are enthusiastic about advancing your career while also aiding others in their professional development, we invite you to join our team. Broadridge is a prominent global fintech firm with a revenue exceeding $6 billion. Our expertise lies in providing communication services, cutting-edge technology solutions, data management, and insightful analytics. We are dedicated to facilitating business evolution for our clients by offering solutions that enhance customer engagement, manage risks, streamline operations, and drive revenue growth. With a workforce of over 10,000 full-time professionals worldwide, Broadridge maintains a substantial presence across North America, Europe, and Asia. For further information, please visit our website at www.broadridge.com. As part of our team, you will assume a technical role supporting and contributing to the planning, construction, and maintenance of the Identity Access Management (IAM) program. In this position, you will collaborate with various departments within the information technology sector and business units to incorporate information security prerequisites into Identity & Access Management solutions effectively. **Essential Qualifications:** - Bachelor's degree in Technology or a related field - Possess 3 to 6 years of experience in Information Security - Excellent verbal and written communication skills, with the ability to follow instructions and provide constructive feedback - Proficiency in managing Privileged Access Management (PAM) tools, preferably Broadcom CA PAM or BeyondTrust - Sound understanding of contemporary identity and access management principles and best practices, including managing privileged user accounts, implementing least-privileged access models, and segregating duties. Familiarity with OS-level, application-level, and database-level integrations is essential - Skilled in overseeing the identity lifecycle, encompassing provisioning, deprovisioning, and access rights management, particularly in platforms like Active Directory - Experience in bulk onboarding of users, devices, and policy configurations across diverse operating systems - Proficient in troubleshooting and resolving access-related issues, accounts, authentication, authorization, entitlements, and permissions - Ability to implement secure systems providing seamless application access, supporting internal teams while ensuring system stability and security - Responsible for administering privileged user accounts across various platforms, including Windows, UNIX, databases, networks, and applications - Availability for on-call duties on a rotational basis as dictated by business needs - Collaborative mindset for joint deliverables with extended teams - Effective coordination of multiple tasks to meet tight deadlines efficiently - Good to have Information Security/IAM Certifications **Desired Experiences:** - Contribute to identity architecture development and strategic decisions as Broadridge grows and matures - Design and implement Role-Based Access Control (RBAC) systems to enhance access management and compliance - Basic familiarity with cloud environments such as AWS or Azure, and Windows and Unix administration is advantageous - Proficient in scripting and logical thinking for automating IAM processes - Understanding of Multi-Factor Authentication (MFA) technologies - Operational skills with experience in auditing and log management - Knowledge of authentication technologies and their interaction with various platforms, both on-premises and in the cloud - Insight into integrating platforms like Active Directory, SIEM systems, MFA, and custom applications into PAM tools - Proficiency in managing Vault solutions, preferably HashiCorp, with experience in cloud environment integration **Roles and Responsibilities:** - Onboard users and devices, establish and administer access policies within the PAM tool, and ensure seamless integration and adherence to security protocols - Actively participate in implementing, integrating, and evaluating IAM solutions, expanding capabilities to support organizational growth - Supervise the maintenance and ongoing support of the PAM platform to ensure high availability and optimal performance - Provide support during system upgrades, patch deployments, and routine maintenance activities, ensuring compliance with security standards - Monitor reports to identify potential security incidents, respond to alerts, and take appropriate actions to mitigate risks - Deliver comprehensive operational support for all IAM-related processes and systems, proactively troubleshooting and resolving access-related issues - Collaborate with internal teams to gather necessary information and facilitate joint deliverables, integrating IAM solutions with other security and IT systems Join us in our commitment to fostering a collaborative, engaging, and inclusive environment where every individual feels safe, valued, and understood. At Broadridge, we celebrate and recognize the unique perspectives of our associates, striving to create a workplace that empowers everyone to bring their best selves to work.,
Posted 1 month ago
4.0 - 8.0 years
0 Lacs
pune, maharashtra
On-site
ZS is a place where passion changes lives. As a management consulting and technology firm focused on improving life and how we live it, our most valuable asset is our people. Here you'll work side-by-side with a powerful collective of thinkers and experts shaping life-changing solutions for patients, caregivers and consumers, worldwide. ZSers drive impact by bringing a client first mentality to each and every engagement. We partner collaboratively with our clients to develop custom solutions and technology products that create value and deliver company results across critical areas of their business. Bring your curiosity for learning; bold ideas; courage and passion to drive life-changing impact to ZS. Our most valuable asset is our people. At ZS we honor the visible and invisible elements of our identities, personal experiences and belief systemsthe ones that comprise us as individuals, shape who we are and make us unique. We believe your personal interests, identities, and desire to learn are part of your success here. Learn more about our diversity, equity, and inclusion efforts and the networks ZS supports to assist our ZSers in cultivating community spaces, obtaining the resources they need to thrive, and sharing the messages they are passionate about. Senior Security Operations Analyst We are seeking an experienced professional to join our Pune, India office as a Senior Security Operations Analyst with a strong background in Security Information and Event Management (SIEM) platforms, specifically in Microsoft Sentinel and Wiz. The ideal candidate will be responsible for leading advanced threat detection, response, and monitoring activities. This role will be critical in enhancing our cybersecurity posture and ensuring the ZS environment remains secure against emerging threats. What you'll do: - Manage the day-to-day operations of Microsoft Sentinel, including rule creation, log ingestion, data analytics, and alert triaging - Develop and tune detection rules, use cases, and analytics within Sentinel to improve threat visibility and detection capabilities - Leverage Wiz Defend to detect and respond to runtime threats across cloud workloads and Kubernetes environments in real-time - Continuously monitor and investigate alerts generated by Wiz Defend to enhance threat detection, triage, and incident response capabilities - Perform proactive threat hunting to identify and mitigate advanced threats - Conduct in-depth incident investigations and coordinate response efforts to ensure swift remediation - Collaborate with internal stakeholders and the Threat Intelligence team to identify and mitigate potential security threats - Generate reports and dashboards to communicate SOC performance metrics and security posture to leadership - Continuously improve SOC processes and playbooks to streamline operations and response efforts - Mentor junior SOC analysts and provide guidance on security best practices - This role requires participation in a rotational shift - Flexibility and availability to respond to urgent incidents outside of assigned shifts, as needed What you'll bring: - Strong analytical and problem-solving abilities - Excellent communication and interpersonal skills to effectively collaborate with cross-functional teams - Proven ability to remain calm and efficient under a high-pressure environment - Proficient in using SIEM tools, such as Microsoft Sentinel - Experience with data migration strategies across SIEM platforms - Experience on Cloud Security Operations and Incident Response platforms such as Wiz - In-depth understanding of cyber threats, vulnerabilities, and attack vectors - Proficient in creating KQL queries and custom alerts within Microsoft Sentinel - Expertise in developing SIEM use cases and detection rules - Skilled in incident response and management procedures - Experienced in conducting deep-dive investigations and root cause analysis for incidents - Adept at collaborating with stakeholders to resolve complex cybersecurity challenges - Ability to automate routine SOC processes to enhance operational efficiency - Experienced in mentoring and guiding junior analysts in security operations - Knowledge of major cloud platforms (AWS, Azure, GCP), including their security models, IAM roles, virtual private cloud (VPC) configurations, and cloud-native security tools Good to have skills and abilities: - Excellent interpersonal (self-motivational, organizational, personal project management) skills - Knowledge of vulnerability management and scanning best practices such as CVE database and the CVS System - Ability to analyze cyber threats to develop actionable intelligence - Skill in using data visualization tools to convey complex security information Academic Qualifications: - Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent experience) - 4+ years of experience in a Security Operations Center (SOC) environment, with a focus on SIEM management - Strong hands-on experience with Microsoft Sentinel, including data connectors, KQL queries, analytics rules, and workbooks - Experience with SIEM migration - Expertise in incident response, threat detection, and security monitoring - Solid understanding of Windows, Linux, and cloud security concepts - Relevant certifications (e.g., CompTIA Security+, Microsoft Certified: Security Operations Analyst, GCIA, GCIH, OSDA, GCFA) are preferred - Preferred Security Cloud Certifications: AWS Security Specialty Perks & Benefits: ZS offers a comprehensive total rewards package including health and well-being, financial planning, annual leave, personal growth and professional development. Our robust skills development programs, multiple career progression options and internal mobility paths and collaborative culture empowers you to thrive as an individual and global team member. We are committed to giving our employees a flexible and connected way of working. A flexible and connected ZS allows us to combine work from home and on-site presence at clients/ZS offices for the majority of our week. The magic of ZS culture and innovation thrives in both planned and spontaneous face-to-face connections. Travel: Travel is a requirement at ZS for client facing ZSers; business needs of your project and client are the priority. While some projects may be local, all client-facing ZSers should be prepared to travel as needed. Travel provides opportunities to strengthen client relationships, gain diverse experiences, and enhance professional growth by working in different environments and cultures. Considering applying At ZS, we're building a diverse and inclusive company where people bring their passions to inspire life-changing impact and deliver better outcomes for all. We are most interested in finding the best candidate for the job and recognize the value that candidates with all backgrounds, including non-traditional ones, bring. If you are interested in joining us, we encourage you to apply even if you don't meet 100% of the requirements listed above. ZS is an equal opportunity employer and is committed to providing equal employment and advancement opportunities without regard to any class protected by applicable law. To Complete Your Application: Candidates must possess or be able to obtain work authorization for their intended country of employment. An online application, including a full set of transcripts (official or unofficial), is required to be considered. NO AGENCY CALLS, PLEASE. Find Out More At: www.zs.com,
Posted 1 month ago
2.0 - 6.0 years
0 Lacs
pune, maharashtra
On-site
As a Lead Cybersecurity Specialist at CRITICALSTART, you will play a crucial role in analyzing security trends, prioritizing risk, and enhancing team processes to ensure effective information security monitoring and triage. Your responsibilities will include mentoring and developing the Cybersecurity Specialist Team, collaborating with internal teams on projects, and driving client adoption and value optimization. With a focus on continuous improvement, innovation, and excellence, you will work in a dynamic environment alongside intelligent and high-performing individuals who value accountability and support each other's growth. The ideal candidate for this role is someone who is passionate about cybersecurity, possesses strong expertise in security investigations, and excels in conducting interviews and screenings. You should have at least five years of experience in Cyber Security Analytics, two years of experience in a people management or team lead role, and a four-year degree in Computer Science, Engineering, or Cyber Security. Additionally, proficiency in using Endpoint Protection, Endpoint Detection & Response, and SIEM platforms, along with industry certifications like Security+, CySA+, or CASP+, are required. Your ability to prioritize tasks, handle multiple responsibilities, and effectively collaborate with team members will be essential for success in this role. At CRITICALSTART, we offer a rewarding work environment where you can make a difference every day, collaborate with talented individuals, and continuously learn and grow. Our compensation and benefits package includes a competitive salary with bonus potential, flexible PTO policy, and opportunities for remote or hybrid work models. While we take our work seriously, we also believe in maintaining a casual and comfortable atmosphere that fosters creativity and innovation. If you are enthusiastic about joining a company that values innovation, excellence, and a supportive work culture, we invite you to apply for the Lead Cybersecurity Specialist position at CRITICALSTART through our career site. Join us in shaping the future of cybersecurity and making a positive impact in the industry.,
Posted 1 month ago
2.0 - 6.0 years
0 Lacs
pune, maharashtra
On-site
As a Lead Cybersecurity Specialist at CRITICALSTART, you will be an integral part of our team in India, working under the Critical Start umbrella. Your primary focus will be on information security monitoring and triage within our Managed Security Services business. You will not be required to travel, allowing you to fully immerse yourself in the role. Your responsibilities will include analyzing security trends within customer environments, prioritizing risk from triaged security technologies, enhancing team processes, and mentoring the Cybersecurity Specialist Team. Collaborating with RSOC and MDR Operation Teams on internal projects will also be a key aspect of your role to drive client adoption and value optimization. To excel in this position, you should bring at least five years of experience in Cyber Security Analytics and two years of experience in a people management or team lead role. A four-year degree in Computer Science, Engineering, or Cyber Security is required, along with proficiency in Endpoint Protection, Endpoint Detection & Response, and SIEM platforms. Holding certifications such as Security+, CySA+, CASP+, or equivalent is essential. Your ability to effectively prioritize tasks, handle multiple responsibilities, and utilize MS Products will be crucial in meeting client deliverables. At CRITICALSTART, we offer a dynamic and rewarding work environment where professionalism is balanced with a relaxed atmosphere. You will have the opportunity to make a real impact while enjoying a flexible PTO policy and the choice of working in the office, remotely, or adopting a hybrid model. Compensation includes a competitive salary with bonus potential, ensuring that your contributions are recognized and rewarded. We are committed to maintaining a safe and trustworthy hiring experience and will never request financial information or sensitive data during the interview process. Should you have any concerns or encounter suspicious requests, please contact us directly at recruiting@criticalstart.com. If you are enthusiastic about joining a team that values innovation, collaboration, and excellence in cybersecurity, we invite you to apply for the Lead Cybersecurity Specialist position at CRITICALSTART through our career site: [Apply Here](https://www.criticalstart.com/careers/). Your journey towards shaping the future of cybersecurity starts here.,
Posted 2 months ago
10.0 - 15.0 years
30 - 37 Lacs
Bengaluru
Work from Office
Your Impact You will drive the transformation of digital and security landscapes for our top customers across industries. In this role, youll consult, audit, design, lead implementations, and where needed optimize cutting-edge enterprise solutions within the Cisco portfolio. Collaborate with cross-functional teams to address diverse challenges, protect critical assets, and support customers in achieving resilience and compliance. Engage with dynamic industries, influence technology strategies, and tackle risks. With access to Ciscos innovation ecosystem and continuous learning opportunities, youll be at the forefront of crafting secure, scalable solutions that empower businesses in India and SAARC. Solution Design & Delivery Develop and deliver comprehensive Enterprise Solutions, including but not limited to Cisco DNA, SD-WAN, Security solutions, Data Center portfolio, Cloud Solutions and more. Lead Architectural discussions and workshops with clients to align solutions with their business and technical objectives & Build high-level and detailed design documents, implementation plans, and deployment playbooks for their technologies. Customer Engagement & Thought Leadership Build and maintain positive relationships with CXO-level customers, acting as a trusted advisor on security strategy and architecture. Drive conversations with industry leaders to position Cisco as the preferred security partner & represent Cisco at industry forums, conferences, and roundtables to share insights and demonstrate Ciscos technology leadership. Technical Leadership Collaborate with internal and external customers, including sales, product, and engineering teams, to define and drive security solutions & provide technical escalation support for complex implementations and troubleshooting issues. Stay updated on emerging security threats, industry trends, and Ciscos evolving security portfolio to deliver innovative solutions. Professional Services Enablement Mentor and train delivery engineers, ensuring alignment with Ciscos methodologies and security frameworks. Support RFPs/RFIs, effort estimation, and proposal creation for professional services engagements & Develop reusable templates, tools, and frameworks to improve delivery efficiency and standardization. Minimum Qualifications Bachelors or Masters degree in Computer Science, Information Technology, or a related field. 10+ years of experience in ITES and Enterprise IT, with at least 5 years in a Customer Facing solutions architect role. Strong knowledge of Ciscos and Competition Enterprise and Security portfolio. Preferred Qualifications (Provide up to five (5) bullet points: these can include soft skills) CCIE Enterprise Infrastructure/Wireless/Security or CCDE Other equivalent industry certifications Relevant certifications in cloud technologies (e.g., AWS Certified Solutions Architect, Microsoft Certified: Azure Solutions Architect Expert) DevOps AI/GenAI Certifications
Posted 3 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |