Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
0.0 - 2.0 years
2 - 2 Lacs
hyderabad
Work from Office
Job Overview: We are seeking a vigilant and detail-oriented CCTV Surveillance Operator to monitor and operate electronic surveillance equipment. The ideal candidate will be responsible for identifying security risks, responding to incidents, maintaining surveillance records, and ensuring the overall security of the monitored area. Key Responsibilities: Operate and monitor CCTV surveillance systems to ensure the safety and security of the premises. Identify and assess potential security risks and report them to the appropriate authorities or security personnel. Respond promptly to all incidents and security breaches, following standard operating procedures. Prepare and submit detailed incident reports, documenting events, actions taken, and outcomes. Share relevant images and video footage with the security team as required for further action or analysis. Maintain accurate and up-to-date logs of all surveillance activities, including system status and incident reports, using Excel or other software. Perform computer operations related to surveillance systems and incident management. Work in rotational shifts, ensuring 24/7 security monitoring coverage. Qualifications: Proven experience in CCTV monitoring or a similar role is preferred. Strong attention to detail and ability to identify potential security threats. Proficiency in computer operations and Microsoft Excel. Ability to work under pressure and respond quickly to security breaches. Excellent communication skills to report incidents and coordinate with team members. Flexibility to work in rotational shifts, including nights, weekends, and holidays. Key Skills: CCTV Systems Operation Incident Management Report Preparation and Documentation Microsoft Excel Security Awareness and Risk Identification Strong Communication Skills. Mandatory Key Skills Surveillance Equipment,CCTV Systems Operations,Computer Operations,Risk Assessment,Security Awareness,Video Footage Sharing,Documentation,Security Team Coordination,CCTV Surveillance*,Security Monitoring*,Incident Management*,Security Risk Identification.
Posted 3 weeks ago
3.0 - 7.0 years
10 - 20 Lacs
bengaluru
Hybrid
Say hello to possibilities. Its not everyday that you consider starting a new career. Were RingCentral, and were happy that someone as talented as you is considering this role. First, a little about us, we’re the global leader in cloud-based communications and collaboration software. We are fundamentally changing the nature of human interaction—giving people the freedom to connect powerfully and personally from anywhere, at any time, on any device. We’re a $2 billion company that’s growing at 30+% annually. Job Type: Full-Time Department: Security This is a great opportunity to work at a rapidly growing, market leading Unified Communications as-a-service company. RingCentral provides Voice-over-IP (VoIP), hosted PBX, voicemail, SMS, e-fax, and HD video meeting solutions for business. About this role: As a SOC Analyst at RingCentral, your primary responsibilities are to implement a comprehensive security monitoring, incident response and threat intelligence program for RingCentral’s global cloud service, corporate and development environments. You will also be collaboratively providing feedback to improve security operations processes, generating actionable analysis and threat intelligence from tools, logs, and other data sources, ensuring strong documentation is in place to support ongoing SOC activities, and reporting your observations to other Security, Operations and IT personnel. Successful Candidates will: Have proven skills in application security, security monitoring, incident response and intrusion analysis Have strong knowledge of the diverse methods and technologies used to attack web/mobile/desktop applications, SaaS infrastructure, and data Think critically, work well under pressure, and possess strong analytical, written, verbal, and interpersonal skills Demonstrated track record of quality processes in candidate’s work history Be strongly self-motivated with an aptitude for both individual and team-oriented work Have experience following and refining standard operating procedures and playbooks Responsibilities: Monitor security events, analyze and investigate alarms, and maintain day-to-day operational activities of a secure cloud environment Engage teams within and outside of RingCentral to mitigate and resolve cases Maintain relevant documentation and audit artifacts Identify and track suspicious system activity Identify trends and patterns, and present them to Security Engineers to enhance our processes and systems This role participates in on-call rotations Qualifications / Requirements: 3+ years in a security engineering, SRE, or SOC roles in a cloud services environment Experience with SIEM Experience investigating security incidents Basic knowledge AWS or GCP Experience with IDS, case management, and related tools and practices Experience with Linux, RedHat preferred Basic knowledge of broad security topics such as encryption, application security, malware, ransomware, etc. Knowledge of network, VoIP and web related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, HTTPS, SIP, RTP) Preferred Skills/Experience: Any combination of the following certifications: GCIA (GIAC Certified Intrusion Analyst) GCIH (GIAC Certified Incident Handler) GCFA (GIAC Certified Forensic Analyst) GNFA (GIAC Certified Network Forensic Analyst) GCFE (GIAC Forensic Examiner) GASF (GIAC Advanced Smartphone Forensics) GICA GCTI (GIAC Certified Cyber Threat Intelligence) GPEN (GIAC Certified Pentester) GWAPT (GIAC Certified Web Application Pentester) GPYC (GIAC Certified Python Coder) OSCP (Offensive Security Certified Pentester) Experience using Crowdstrike, Cloudflare, FirePower, Splunk, ELK, Imperva, Syslog, packet capture, and Windows Event Log tools and similar tools Knowledge of current hacking techniques, malicious code trends, botnets, exploits, malware, DDoS, and data breach events Strong knowledge of Microsoft Windows Experience automating security tasks, including scripting, programming and/or SecDevOps Experience working with global teams
Posted 3 weeks ago
4.0 - 7.0 years
10 - 15 Lacs
thane, navi mumbai, mumbai (all areas)
Work from Office
Position Purpose The Information Security Architect is responsible for designing, implementing, and maintaining secure enterprise architecture to protect organizational assets. This role ensures that all IT systems and projects comply with established security policies, standards, and best practices. The architect works closely with cross-functional teams to integrate security into infrastructure, applications, and cloud environments, while supporting compliance and risk management initiatives. Closely work with IT teams, software developers, and business stakeholders to integrate security into the design and development lifecycle. Position Responsibilities High level Job description below: Design and maintain enterprise security architecture across on-premises, cloud, and hybrid environments. Conduct comprehensive security architecture reviews to identify vulnerabilities, assess risk, and improve system and application designs. Design, implement, and manage network and cloud security controls, including firewalls, WAFs, load balancers, IDS/IPS, and VPNs. Perform regular system and application risk assessments, including vulnerability scans, to detect and mitigate security risks. Collaborate with IT, DevOps, and infrastructure teams to ensure security best practices are embedded into system, application, and network designs. Evaluate, recommend, and implement security tools and technologies such as IAM, SIEM, encryption, endpoint protection, and cloud-native security solutions. Continuously monitor emerging threats, vulnerabilities, and technology trends; recommend enhancements to improve the organization's security posture. Ensure compliance with internal security policies, regulatory requirements, and industry standards (e.g., ISO 27001, NIST, PCI DSS, HIPAA). Support security incident response, vulnerability tracking, and remediation planning. Conduct gap analyses and support security audits and governance activities. Provide detailed security risk assessments, architecture documentation, and mitigation recommendations to technical teams and senior management. Suggest and drive implementation of security improvements to reduce organizational risk. Maintain documentation of architectural decisions, risk evaluations, and compliance findings. Qualifications and Experience Requirement Essential Bachelor's or Masters degree in any steam or in Computer Science, Information Security. Any one or two certification in security frameworks such as CISSP, ITIL, CISM, CISA, CRISC, ISO 31000, ISO 27001:2013 Lead Auditor /Implementation is preferred. Essential Minimum 4-5 years of experience in information security Strong understanding of security concepts, system architecture, web and mobile application security, API security, including basic knowledge of network and cloud security, Knowledge of regulatory requirements. Knowledge on compliances like ISO27001:2013, PCI-DSS, RBI guidelines related to critical and payments application Strong analytical and problem-solving skills. Excellent communication and interpersonal skills. Well versed with emerging technologies, associated risks and associated controls to manage risks. Threshold Competencies Technical Expertise: Deep understanding of security technologies, tools, and best practices. Problem-Solving: Ability to identify, analyse, and resolve complex security issues. Decision-Making: Ability to make sound judgments in high-pressure situations. Communication: Effective communication skills, both written and verbal. Leadership: Ability to lead and motivate a team of security professionals. Leadership Competencies Strategic Thinking: Ability to develop and implement long-term security strategies. Innovation: Drive innovation and continuous improvement in risk management Influence: Ability to influence and persuade others, including senior management. Relationship Building: Ability to build and maintain strong relationships with stakeholders. Change Management: Ability to manage change effectively and adapt to new challenges.
Posted 3 weeks ago
1.0 - 3.0 years
4 - 8 Lacs
bengaluru
Remote
SOC Analyst Job Summary: We are seeking a highly motivated and detail-oriented SOC Analyst to join our Security Operations Center (SOC). The SOC Analyst will be responsible for monitoring, analyzing, and responding to cybersecurity incidents using a variety of tools and techniques. This role is essential in identifying threats, mitigating attacks, and ensuring the overall security posture of the organization. This position also offers opportunities to participate in broader cybersecurity initiatives. Motivated individuals may have the chance to expand their skill sets and take on additional cybersecurity projects or responsibilities as assigned. Key Responsibilities: • Monitor security alerts and events from various security tools (SIEM, IDS/IPS, EDR, etc.) • Analyze network traffic, logs, and system data to detect anomalies and potential threats • Investigate and respond to security incidents, escalating as necessary • Perform initial triage of alerts to determine severity and potential impact • Document incidents, findings, and remediation steps in ticketing systems • Collaborate with IT teams to implement and improve incident response procedures • Stay up to date with current threat trends, vulnerabilities, and threat intelligence feeds • Participate in threat hunting and vulnerability scanning activities • Assist in the creation of SOC playbooks, standard operating procedures (SOPs), and reports • Contribute to additional cybersecurity projects and tasks as assigned Required Qualifications: • Bachelors degree in Computer Science, Cybersecurity, Information Technology, or related field or industry-recognized certification(s) (e.g., Security+, GSEC, CEH, etc.) • 13 years of experience in a cybersecurity or IT security role • Knowledge of cybersecurity fundamentals, including malware, attack vectors, and threat mitigation • Experience with Security Information and Event Management (SIEM) platforms (e.g., Splunk, QRadar, LogRhythm) • Understanding of TCP/IP, OSI model, firewalls, and network protocols • Strong analytical and problem-solving skills • Excellent written and verbal communication skills Preferred Qualifications (Nice to Have): • Experience with scripting or automation (e.g., Python, PowerShell) • Familiarity with cloud architecture and security tools (AWS, Azure, GCP) • Strong understanding of Identity and Access Management (IAM) principles and implementation • Experience in threat hunting and digital forensics
Posted 3 weeks ago
5.0 - 10.0 years
7 - 17 Lacs
bengaluru
Work from Office
About this role: Wells Fargo is seeking a Lead Information Security Engineer for the ICS Team. The ICS team is seeking a Lead Information Security Engineer with extensive experience in incident response, network-focused forensics, and threat hunting. The ideal candidate will have a well-rounded background in endpoint/network defenses and security incident response, as well as some offensive security knowledge to allow the ability to think like an adversary. The candidate will also have experience partnering with content development teams to resolve gaps in detection capabilities, as well as experience in conducting technical research and identifying methods to detect evolving Advanced Persistent Threat (APT) Tactics, Techniques, and Procedures (TTPs). This role will serve as an incident responder to assess the risk, impact, and scope of identified security threats, as well as leading the response efforts to include containment, eradication, and recovery. Strong verbal and written communication skills are desired, to ensure thorough and accurate reporting during and concluding a security incident. The candidate will also play a major role in detecting advanced threats that are not detected via traditional security tools and understand how to operationalize cyber threat intelligence. Regular collaboration with multiple teams such as the Cyber Threat Fusion Center, Security Content Development, Cyber Threat Intelligence, and Offensive Security Research teams will be critical to success. In this role, you will: Lead computer security incident response activities for highly complex events Conduct technical investigation of security related incidents and post incident digital forensics to identify causes and recommend future mitigation strategies Provide security consulting on large projects for internal clients to ensure conformity with corporate information, security policy, and standards Design, document, test, maintain, and provide issue resolution recommendations for highly complex security solutions related to networking, cryptography, cloud, authentication and directory services, email, internet, applications, and endpoint security Review and correlate security logs Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity Identify security vulnerabilities and issues, perform risk assessments, and evaluate remediation alternatives Collaborate and influence all levels of professionals including managers Lead a team to achieve objectives Required Qualifications: 5+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education Desired Qualifications: Strong years of experience in Information Security Industry. Experience with SIEM tools like Splunk, Arcsight. Incident Response Protocols and Tools experience Information technology applications and systems experience Experience in managing cybercrime detection, investigation, and intelligence strategies DPI (Deep Packet Inspection) experience Knowledge and understanding of banking or financial services industry Strong verbal and written communication skills are desired, in order to ensure thorough and accurate reporting during and concluding a security incident. Ability to execute in a fast paced, high demand, environment while balancing multiple priorities Demonstrate the ability to provide written and verbal communications to management to address real-time issues and incidents, including writing formal incident reports Knowledge of offensive security, with the ability to think like an adversary when performing reverse engineering and responding to incidents Job Expectations: Information security experience including experience in one or more of the following security disciplines: information security monitoring, incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity, or cyber threat intelligence Ability to execute in a fast paced, high demand, environment while balancing multiple priorities Highly refined and professional verbal and written communications Knowledge and understanding of banking or financial services industry Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or Web Application Penetration Tester (WAPT) certification
Posted 3 weeks ago
3.0 - 8.0 years
12 - 22 Lacs
hyderabad
Work from Office
Role: L2 SOC Location: Hyderabad Shift Timings: Rotational about alliantgroup alliantgroup is a professional services firm that provides tax consulting and compliance services to businesses in the United States. The company was founded in 2002 and is headquartered in Houston, Texas. alliantgroup services are focused on helping businesses claim tax credits and incentives that they are entitled to under various federal and state programs. These credits and incentives are designed to encourage businesses to invest in certain types of activities, such as research and development, energy efficiency, and hiring employees from certain disadvantaged groups. alliantgroup services include helping businesses identify and claim these credits and incentives, as well as providing guidance on compliance with the relevant regulations. alliantgroup is headquartered in Houston, Texas with additional offices located in Austin, Boston, Chicago, Indianapolis, New York, Irvine, Sacramento, Washington, D.C.; and Bristol and London in the U.K. More about our culture and why we love alliantgroup https://youtu.be/nM_9fXXwyrg https://youtu.be/erJobvthqRw alliantgroup India Talent Pvt. Ltd: alliantgroup started its operations in India in the year 2020 with a world-class office in Hyderabad to provide Tax, Advisory, Audit and Accounting services. alliantgroup India Talent comprises a team of skilled professionals who address the most pressing needs of U.S CPA Firms. We work with the best talent and ensure our clients get top quality services they need. We are currently a family of 1000+ employees. Our people and culture set us apart as a firm, and our team includes professionals from a diverse array of fields, including business, engineering, software development, law, and accounting. Alliant Cybersecurity Alliant Cybersecurity created a full-service cybersecurity consultancy for American businesses. We are technology and vendor agnostic and have a customizable security plan that can be made to fit any businesss needs. Our team has seasoned penetration testers, auditors, technologists, and security analysts to help with client’s needs whether it’s a one-time project or permanent outsourced cybersecurity to our Managed Security Operations Center. We are here as an extension of client’s team, offering straightforward solutions to everyday cybersecurity challenges especially in the moments that matter most. Role Overview Alliant Cybersecurity is seeking an experienced Level 2 analyst based in Hyderabad to help expand its Cybersecurity and Risk Advisory practice. This position primarily supports US-based customers and requires flexibility to work during US business hours. What You'll Do: Security Operations & Investigation: Lead deep-dive investigations of escalated L1 incidents Analyze data from multiple security tools and sources Participates to crisis management by providing support to the incident handler and the SOC Level 3 analysts Create reports and visualizations of security attacks Use Case Fine tuning, New Use case creation Tracks trends for metrics and reporting Works on the decrease of false positives Maintain the detection rules database Trending and correlation of monitored events to build new Indicators of Compromise (IOC), attack attribution and helping establish countermeasures increasing cyber resiliency Customer Engagement: Participates to recurring meeting with the customer as the technical referent. Provides recommendations or workarounds to the customer in order to reduce business impact Leads and participates to the continuous improvement of the service (detection level, process, operational procedures, service efficiency, service reporting) Supports the customer for the remediation of incidents Supports the SOC manager for the reporting of the activity. Continuous Improvement: Drive improvement plans and documentation Mentor L1 analysts Work independently on complex analyses Maintain process/procedure documentation Support CISO, CIO, and Head of SOC during incidents Lead continuous service improvement initiatives Coordination with ISMS core team to support ISMS activities and implantation strategies at the company. Education: Bachelor’s degree in computer science, Engineering, or other related discipline. Certifications: Professional Security certifications are a plus (CISSP preferred.) What are we looking for: Minimum 4 years of SOC experience Expert knowledge in: Computer Forensics Reverse Engineering IDS/SIEM/Log Management Threat Intelligence Malware Analysis EDR & Incident Response Vulnerability Management Essential Skills: Rigorous process adherence and attention to detail Strong time management and multitasking abilities Information security mindset Team leadership capabilities Excellent analytical and problem-solving skills Outstanding communication and documentation abilities Autonomous and self-organized Experience in tactical coordination during incidents What we offer: With us, there are always opportunities to break new ground. We empower you to take the organization to the next level with the versatile experience that you bring in. We trust you with responsibility early on and support you in all ways to make this organization as trusted partner to the customers and a great place to work for the employees. Join us and bring your curiosity to life!
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Information Event Management. Experience: 5-8 Years.
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Zscaler Web Security. Experience: 5-8 Years.
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Metricstream - GRC. Experience: 5-8 Years.
Posted 3 weeks ago
2.0 - 5.0 years
3 - 4 Lacs
mumbai, mumbai (all areas)
Work from Office
SPOC for female employees who have security concerns, experience harassment, or need assistance with sensitive matters. Ensure a safe and confidential environment. Training and awareness. Support Escort guards in ensuring first drop of female.
Posted 3 weeks ago
7.0 - 9.0 years
4 - 8 Lacs
gurugram
Work from Office
Role Description : As a Technical Lead - Cloud Security at Incedo, you will be responsible for designing and implementing security solutions for cloud-based environments. You will work with clients to understand their security needs and design security solutions that meet those needs. You will be skilled in cloud security technologies such as Amazon Web Services (AWS) Security, Microsoft Azure Security, or Google Cloud Platform (GCP) Security and have experience with security architecture design patterns such as multi-factor authentication and encryption. Roles & Responsibilities: Developing and implementing cloud security strategies and policies Conducting security audits and assessments Collaborating with other teams to ensure compliance with security regulations and standards Troubleshooting and resolving security issues Providing guidance and mentorship to junior cloud security specialists Staying up-to-date with industry trends and best practices in cloud. Technical Skills Skills Requirements: Understanding of cloud security concepts such as data protection, identity and access management, or encryption. Familiarity with compliance frameworks such as SOC 2, HIPAA, or PCI DSS. Experience with cloud security tools such as AWS Identity and Access Management (IAM), Azure Active Directory, or Google Cloud IAM. Knowledge of network security and security monitoring technologies. Must have excellent communication skills and be able to communicate complex technical information to non-technical stakeholders in a clear and concise manner. Must understand the company's long-term vision and align with it. Should be open to new ideas and be willing to learn and develop new skills. Should also be able to work well under pressure and manage multiple tasks and priorities. Nice-to-have skills Qualifications 7-9 years of work experience in relevant field B.Tech/B.E/M.Tech or MCA degree from a reputed university. Computer science background is preferred
Posted 3 weeks ago
9.0 - 14.0 years
15 - 25 Lacs
noida
Work from Office
Role & responsibilities : We are seeking a dedicated Subsidiary Security Manager to safeguard our employees and facilities within their purview, promoting the Group Security Policy. This role involves assessing threats and vulnerabilities, and proposing solutions to mitigate potential risks. The scope of this includes all the 5 entities of Air Liquide in India. Overall Responsibility: Ensure the comprehensive safeguarding of personnel, facilities, and information assets by enforcing Group Security and Information Protection policies. Risk Management: Conduct threat/vulnerability assessments, implement mitigation, and ensure continuous security enhancements. Policy & Compliance: Define and enforce Entity-specific security procedures, verifying adherence through site visits. Proactive Security: Monitor national security landscapes, anticipate impacts from Group projects, and implement proactive measures. Crisis Management: Enhance resilience, manage crises, develop localized solutions, and ensure operational recovery. Stakeholder Engagement: Maintain relationships with site managers, Hub Security, and external contractors; contribute to Group Security Policy implementation. Planning & Reporting: Report to the QHSE & Security Director, formulate annual security action plans, and communicate to relevant sites. Strategy & Training: Design tailored action plans, select contractors, disseminate training, and collaborate with other Security Managers/Hub support. Site Audits: Conduct regular on-site visits, propose corrective measures, and ensure local adherence to Group regulations. Travel Policy: Ensure strict compliance with Group Travel Policy (GP-05) for high-risk destinations. Project Integration: Facilitate security procedures for new E&C and CI projects. Major Crisis Response: Contribute to crisis management, extract lessons learned, and advise the General Manager. Security Culture: Foster security awareness through training and campaigns. Information Protection Compliance: Ensure adherence to Group Digital Security, Confidential Information Protection, and Access Management policies; develop corrective actions for non-compliance. Local Info Protection Program: Define and implement local programs, integrate with risk management, monitor progress, and report to Zone IPC. Digital Asset Protection: Assist in identifying sensitive data, ensure risk assessments for IT projects, and manage/report digital security incidents. Awareness: Conduct campaigns for digital risks; distribute and present the "AL Group User's code of conduct for digital protection." Regulatory Compliance: Ensure adherence to local information protection and privacy laws. Preferred candidate profile Education: Bachelor's/Master's Degree; Cyber Security Certification; CISSPs/CISM/CISA (Preferable). Background: Engineering, Business School, Armed Forces/Police Officer with relevant experience, or Security Manager in manufacturing/industrial sector. Experience: Minimum 8 years in security domain; experience in cyber security required. Languages: Fluent in local language; working knowledge of English; French preferred. Expertise: Strong Project Management, Business Intelligence, Economic Security (investigations, classified info), Protection Systems, Secure Information Systems, Monitoring Systems, In-depth Regional/Country Knowledge. If interested , apply with your updated profile at below mentioned Air Liquide's career Page link : https://airliquidehr.wd3.myworkdayjobs.com/AirLiquideExternalCareer/job/India-New-Delhi/Subsidary-Entity-Security-Manager---Information-Protection-Coordinator_R10073671
Posted 3 weeks ago
5.0 - 9.0 years
11 - 15 Lacs
bengaluru
Work from Office
The primary focus at EITSI is to develop the next generation LIMS (Lab Information Management system), Customer portals, e-commerce solutions, ERP/CRM system, Mobile Apps & other B2B platforms for various Eurofins Laboratories and businesses. Position Title: Senior. Information Security Analyst Team: Regional Security Support Crew (Information security) Reporting Location: Bangalore (B4 / B5) Job Overview: As a Regional Security Support crew, your primary role, will be to assist the Regional Information Security Officers (RISO) in implementing and maintaining cybersecurity strategies for various legal entities Globally. You will be responsible for ensuring compliance with group security policies, managing risks, and supporting the continuous improvement of the regional security posture. This role offers a unique opportunity to be part of a newly established team, providing a dynamic environment where you can help shape security processes from the ground up. Key Responsibilities: Provide direct support to the RISO in managing and implementing security plans for legal entities across the region. Assist in the creation, follow-up, and management of remediation plans for identified security risks and non-compliance issues. Conduct security risk assessments and ensure that security measures are aligned with the Group"™s standards and adapted to each legal entity"™s needs. Support the RISO in reviewing and approving changes to systems, processes, and applications prior to deployment. Perform and prioritize security audits, vulnerability scans, and reviews (including access rights, firewall rules, cloud compliance, etc.). Coordinate and support legal entities during internal and third-party security audits, ensuring compliance with all security policies. Conduct security training and awareness programs customized for regional entities, ensuring all staff are informed and compliant. Maintain accurate inventories of assets, third-party vendors, and local processes for audit and security monitoring purposes. Collaborate with regional and Group IT teams to ensure a "security by design" approach is applied in all regional architectures, applications, and processes. Assist in evaluating third-party vendors to ensure they meet security standards. Support the development of Disaster Recovery (DR) and Business Continuity (BC) plans. Assist the RISO with the development and implementation of policies, procedures, and guidelines that cater to local regulatory requirements and Group standards. Core Responsibilities in Incident Response and Vulnerability Management: Assist the RISO in incident response activities by investigating security breaches and incidents in collaboration with the Security Operations Center (SOC). Analyze vulnerability reports and assist in remediation efforts, ensuring timely patching and risk mitigation. Support the review and approval of firewall rules, configurations, and exceptions to maintain network security. Collaborate with the RISO in monitoring for emerging threats and recommending security improvements based on current trends. Qualifications & Skills: Strong communication and interpersonal skills, with the ability to work effectively with multiple stakeholders across various legal entities. Ability to manage multiple priorities and work under pressure in a fast-paced environment. Strong knowledge of cybersecurity concepts, including vulnerability assessments, incident management, network architecture, firewalls, and cloud security. Expertise in general IT concepts, including Active Directory, Office 365, and modern networking solutions like micro-segmentation, SASE, SD-WAN, etc. Demonstrated ability to assist in the creation and execution of security policies, procedures, and standards. Familiarity with security frameworks such as ISO 2700x, ITIL, and the EU Privacy Directives. Experience in conducting security assessments and working with audit teams during internal or external security reviews. Education & Experience: At least 3+ years of experience in cybersecurity, information security, or a related field. Certifications such as CISM, CISSP, or CEH are nice to have. Atypical profiles with experience from bug bounties, open-source projects, or bootcamps are also encouraged to apply if they can demonstrate strong skills and knowledge in the required areas. Total of 9+ years of experience Key Competencies: A quick learner who is autonomous, adaptable, and detail oriented. Ability to work in large, complex IT environments and be comfortable with ambiguity and fast-changing priorities. A passion for cybersecurity, with strong problem-solving skills and a proactive approach to risk management. Strong English language skills are required, additional language is a plus. How You Will Help: Regularly test legal entities for compliance with security policies and procedures. Assist in conducting vulnerability assessments and implementing remediation measures based on Group standards. Investigate security incidents in collaboration with the SOC and provide technical support during audits. Support the development of Security Key Performance Indicators (KPIs) to monitor and improve the region"™s security posture. This is an exceptional opportunity for cybersecurity professionals who thrive in dynamic environments and enjoy creating and improving security processes. If you are passionate about cybersecurity and want to play a crucial role in protecting a diverse range of legal entities across Europe, we encourage you to apply. Qualifications A bachelor"™s degree in computer science / Equivalent Stream, Information Security, or a related field is preferred.
Posted 3 weeks ago
6.0 - 10.0 years
17 - 20 Lacs
hyderabad, chennai
Work from Office
The Impact you will have in this role: Qualifications: Minimum of 6 years of related experience Bachelor's degree preferred or equivalent experience Talents Needed for Success:
Posted 3 weeks ago
15.0 - 20.0 years
3 - 7 Lacs
chennai
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Accenture MxDR Ops Security Threat Analysis Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply your security skills to design, build, and protect enterprise systems, applications, data, assets, and people. Your typical day will involve collaborating with various teams to implement security measures, conducting assessments to identify vulnerabilities, and ensuring that the organization's information and infrastructure are safeguarded against potential cyber threats. You will also engage in continuous learning to stay updated on the latest security trends and technologies, contributing to a secure environment for all stakeholders. Roles & Responsibilities:Perform security monitoring by analyzing logs, traffic and alerts generated by variety of device technologiesTimely response to customer requests like detection capabilities, tuning.Research new threats and provide recommendations to enhance detection capabilitiesStrong desire for continuous learning on vulnerabilities, attacks and countermeasures Identify opportunities for process improvement Professional & Technical Skills: Experience in SOC operations with customer-facing responsibilitiesDeep understanding on cyber security fundamentals, security devices, network defense concepts and threat landscapeHands-on experience in SIEM and threat hunting tools Added advantage in working with any SOAR platformDesirable knowledge in any scripting language and EDR productsPreferable GCIA, GCFA, CISSPStrong customer service and interpersonal skillsStrong problem-solving skillsAbility to communicate clearly at all levels, demonstrating strong verbal and written communication skills.Adaptability to accept change Additional Information:Work as part of analysis team that works 24x7 on a rotational shift Minimum a bachelors or a masters degree in addition to regular 15- year full time educationThe candidate should have minimum 2 years of experience This position is based at our Chennai office. Qualification 15 years full time education
Posted 3 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
kochi
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Checkpoint Firewalls and VPN. Experience: 5-8 Years. >
Posted 3 weeks ago
3.0 - 5.0 years
5 - 7 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Checkpoint Firewalls and VPN. Experience: 3-5 Years. >
Posted 3 weeks ago
3.0 - 5.0 years
5 - 7 Lacs
gurugram
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Azure Cloud Workload Security. Experience: 3-5 Years.
Posted 3 weeks ago
10.0 - 15.0 years
13 - 17 Lacs
gurugram
Work from Office
About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and transitioning to cloud security-managed operations. You will engage in discussions to align security strategies with organizational objectives, ensuring that all security measures are effectively integrated into the cloud environment. Your role will also require you to stay updated on the latest security trends and technologies to enhance the overall security posture of the organization. Roles & Responsibilities:1.Design and implement log integration solutions using Splunk to collect, process, and analyze log data from various sources.2.Develop and maintain custom log parsing logic using Splunk's SPL (Search Processing Language) and regular expressions.3.Integrate Splunk with various log sources, including applications, servers, network devices, and security systems.4.Troubleshoot log integration and parsing issues, identifying and resolving problems quickly.5.Collaborate with development teams to implement logging best practices and ensure log data quality.6.Work with security teams to implement security monitoring and incident response solutions using Splunk.7.Develop and maintain documentation for log integration and parsing configurations.8.Stay up to date with Splunk best practices, new features, and industry trends.9.Onboard new log sources to the SIEM system, including Firewalls, Intrusion detection systems, servers, and applications.10.Develop and maintain documentation for log onboarding and configuration11.Collaborate with security teams to ensure log data is properly mapped to SIEM rules and alerts. 10+ years of experience with Splunk, including log integration, parsing, and analysis.- Strong understanding of log data formats, including syslog, JSON, and XML.- Proficiency in SPL (Search Processing Language) and regular expressions.- Experience with log data sources, including applications, servers, network devices, and security systems.- Strong troubleshooting and problem-solving skills.- Excellent communication and collaboration skills.- Ability to work in a fast-paced environment and prioritize multiple tasks. Professional & Technical Skills: - Must To Have Skills: Proficiency in Splunk, including log integration, parsing, and analysis.- Tool proficiency:Splunk- Strong understanding of cloud security principles and best practices.- Experience with security incident response and threat management.- Familiarity with regulatory compliance requirements related to cloud security.- Knowledge of security tools and technologies used in cloud environments. Additional Information:- The candidate should have minimum 5 years of experience in Security Information and Event Management (SIEM).- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Entra ID. Experience: 5-8 Years.
Posted 3 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk.Experience: 3-5 Years.
Posted 3 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: EDR - Cybereason. Experience: 3-5 Years.
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Threat Protection. Experience: 5-8 Years.
Posted 3 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Azure Cloud Workload Security. Experience: 3-5 Years.
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SailPoint Identity Now. Experience: 5-8 Years.
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |