Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 10.0 years
3 - 7 Lacs
Pune
Work from Office
Job ID: 199316 Required Travel :No Travel Managerial - No LocationIndia- Pune (Amdocs Site) In one sentence Manages and coordinates the diverse operation of the department/domain, ensuring that the daily operations are coordinated with vital resource and tools; Ensures that operational directives are carried out in full and to completion, and assures that the schedules, meetings and goals work in harmony towards customer happiness; Tracks and maintains the performance of vendors / external parties to uphold company interests. All you need is... Education Graduate Experience: Minimum 5 years Skills: 1. CommunicationStrong command of written and spoken communication.(Hindi ,Marathi, English) 2. KnowledgeProficient in computer skills, including Excel and PowerPoint. Responsibilities: 1. Email ResponseHandle and respond to security-related emails in a timely manner. 2. Work Plan TrackingTrack and update work plans to ensure all security tasks are completed as scheduled. 3. Budgeting and Invoicing HandlingManage budgeting and invoicing processes for security operations. 4. Vendor Payment Follow-upFollow up on payments with vendors to ensure timely transactions. 5. AMC CoordinationCoordinate Annual Maintenance Contracts (AMC) for security systems and equipment. 6. Report MaintenanceMaintain various types of security reports. 7. Fire Evacuation Drill CoordinationOrganize and coordinate fire evacuation drills to ensure preparedness. 8. Security Incident ResponseManage and respond to security incidents promptly and effectively. 9. Security TrainingConduct security training sessions for staff. 10. Physical Security AuditsPerform physical security audits to ensure compliance and safety. 11. ComplianceEnsure adherence to security policies and regulations. 12. Technology ManagementOversee the management of security technologies. 13. MonitoringContinuously monitor security systems and processes. What will your job look like You will handle the work activities of a department / domain and suggests and/or implements changes that will make the output more effective. Collaborate closely with internal partners and external vendors, and supervises execution of activities Supervise and monitor vendor / supplier performance to improve results and uptime, minimize costs, and maintain high levels of customer happiness. You will support managers / employees in their day-to-day coordination and management of business operational activities and/or issue resolution Coordinate communication between internal units and external vendors / suppliers. You will process, approve and follow up on invoices, rate charges, payments, and other financial operations-related issues You will supervise and updates the relevant systems and business operations policies. You will ensure compliance with company's standards and procedures. You will maintain a high level of service to internal / external customers and ensure superb communication between partners. Who are we Amdocs helps those who build the future to make it amazing. With our market-leading portfolio of software products and services, we unlock our customers innovative potential, empowering them to provide next-generation communication and media experiences for both the individual end user and enterprise customers. Our employees around the globe are here to accelerate service providers migration to the cloud, enable them to differentiate in the 5G era, and digitalize and automate their operations. Listed on the NASDAQ Global Select Market, Amdocs had revenue of $5.00 billion in fiscal 2024. For more information, visit www.amdocs.com Why you will love this job: You will have responsibility to Manages and coordinates the diverse operation of the departments. You will supervise the work activities of a department/ Supervises and monitors vendor as per Amdocs guidelines. You will work with relevant partners supervise and update the relevant systems and business operations policies. We are giving the opportunity to work with the industry s most sophisticated testing technologies and help customers shift into the new testing realities of the digital world! We offer a wide range of stellar benefits including health, dental, vision, and life insurance as well as paid time off, sick time, and parental leave! Amdocs is an equal opportunity employer. We welcome applicants from all backgrounds and are committed to fostering a diverse and inclusive workforce
Posted 2 weeks ago
6.0 - 7.0 years
10 - 14 Lacs
Pune
Work from Office
Job ID: 197283 Required Travel :Minimal Managerial - Yes Location: :India- Pune (Amdocs Site) Who are we Amdocs helps those who build the future to make it amazing. With our market-leading portfolio of software products and services, we unlock our customers innovative potential, empowering them to provide next-generation communication and media experiences for both the individual end user and enterprise customers. Our approximately 30,000 employees around the globe are here to accelerate service providers migration to the cloud, enable them to differentiate in the 5G era, and digitalize and automate their operations. Listed on the NASDAQ Global Select Market, Amdocs had revenue of $4.89 billion in fiscal 2023. In one sentence The Information Security Lead develops, maintains, and publishes required information security standards, procedures, and guidelines per domain of responsibility. Responsible for conceiving and executing forward-looking security systems or processes design, implements programs for user awareness, compliance monitoring, security controls design and implementation. What will your job look like You will maintain the organization's information security effectiveness and efficiency by defining and leading the implementation of security approaches, standards and procedures supporting strategic plans and directions You will lead teams to resolve Information Security challenges. Provide the information security requirements for cross-organization projects and accompany the implementation of the requirements. Utilize deep information security understanding to support internal and external business-related activities, formulate IS solutions based on technical and business requirements. Maintain a detailed knowledge of IS solutions and present them to our customers. You will lead unit level initiatives and ensure competency to meet the needs of the team/ Amdocs /Customers. You will design solutions and formulate response to RFx, create POC/demos, and present IS solutions to customers/corporate stakeholders. Utilize deep technical knowledge of IS products and services to align appropriate solutions based on client need. You will lead and manage Information Security Projects, including (as required) budget and resources, customer relationships, timelines, deliverables, quality and overall management. You will recommend information technology strategies, policies, and procedures by evaluating the organization's outcomes, identifying problems, evaluating trends, and anticipating requirements. You will keep updated with emerging security threats and alerts; conduct research on emerging products, services, protocols, and standards in support of security enhancement and development efforts; collaborate with other cyber threat researchers. You will be accountable for meeting quality objectives, adherence to best practices, quality processes, and methodologies; lead continuous improvement via Root Cause Analysis, Lessons Learned, and Prevention processes; Track quality KPIs and continuously improve quality and measurements. You will promote clarity and alignment with ongoing, effective communication to the project team regarding the unit s goals and status, project matters, companywide changes, special initiative status, etc.; Strive for strong and healthy working relationships within the team. You will provide technical guidance and training to information owners, other security managers, and IT associates. Information Security Manager functions include: You will lead, manage and mentor teams in specific domains such as risk assessment, cyber technologies, corporate security, PMI, SOC, Penetration testing, security operations, etc. You will attract, develop and retain talent to build and maintain strong, effective and competent teams, and ensure the enhancement of their knowledge. Coach and empower the team and foster an environment that encourages teamwork based on motivation and inspiration. Responsible for HR processes such as recruitment, onboarding, definition of clear goals and objectives, ongoing performance management and feedback, career development, and growth of the team and its members. Manage day to day employee relations. 12. Information Security Expert functions include: You will be the technical expert and leader of certain domains such as IT, Application and GRC. All you need is... 1. 6-7 years of experience in the information security management ecosystem 2. Familiarity with industry standards and frameworks, such as NIST, CIS, ISO 27001, and GDPR. 3. Strong understanding of security best practices, including, vulnerability management, system hardening, patch management, and secure coding. 4. Proven experience working with security tools such as CrowdStrike, InsightVM, Tripwire, WIZ etc. 5. Experience with cloud security platforms (AWS, Azure) and native security services 6. Knowledge of network security principles & solutions, including IAM, firewalls, IDS/IPS, and secure network design. 7. Good team player - an advantage 8. Ability to scale up - for cross-domain security tools Why you will love this job: You will have the influence on many of the security teams in Amdocs and therefor the whole company You will bring the innovation into security teams in Amdocs You will have the independence to design the role as you think and like Amdocs is an equal opportunity employer. We welcome applicants from all backgrounds and are committed to fostering a diverse and inclusive workforce
Posted 2 weeks ago
3.0 - 6.0 years
5 - 8 Lacs
Gurugram
Work from Office
Identity & Access Management (IAM) - User Lifecycle Management, maintaining roles(RBAC), entitlements, and policy violations in SailPoint IIQ, Okta (SSO, MFA, SCIM), and Keeper. Troubleshooting authentication/authorization failures and managing quarterly access certifications. Secrets & Key Management - Operating and tuning HashiCorp Vault, provision accounts, manage PKI/TTL policies, champion best practices. Secure Endpoint Management - Operating and Managing EDR / NDR to ensure the tools are configured as per industry best practices Secure Network Access - Administering Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) policies, SSL-inspection exceptions, and environmental health. Ticket & Workflow Governance - Monitoring inbound ticket queues, review access and change requests, and approve or decline workflows in line with internal security policies Third-Party Risk Coordination - Facilitating vendor-led third-party risk assessments: act as primary liaison between the external assessment partner and internal system owners, gather evidence, track remediation items, and ensure assessments are completed on schedule. Client-Facing Communication - Owning ticket queues, status calls, and post-mortems; ensure SLAs are met and stakeholders remain informed 3+ years in security operations, IT ops, or IAM engineering. Hands-on admin experience with at least three of the following: SailPoint IIQ, Okta, HashiCorp Vault, Zscaler, Keeper, Duo, AWS IAM, Azure AD. Working knowledge of authentication protocols (SAML, OAuth 2.0/OIDC, Kerberos, LDAP) and network fundamentals (TCP/IP, TLS, DNS). Familiar with ITIL-based incident, change, and problem-management processes. Excellent written and verbal communication skills; able to run client calls and produce clear after-action reports. Benefits: Tower s headquarters are in the historic Equitable Building, right in the heart of NYC s Financial District and our impact is global, with over a dozen offices around the world. At Tower, we believe work should be both challenging and enjoyable. That is why we foster a culture where smart, driven people thrive - without the egos. Our open concept workplace, casual dress code, and well-stocked kitchens reflect the value we place on a friendly, collaborative environment where everyone is respected, and great ideas win. Our benefits include: Generous paid time off policies Savings plans and other financial wellness tools available in each region Hybrid working opportunities Free breakfast, lunch and snacks daily In-office wellness experiences and reimbursement for select wellness expenses (e.g., gym, personal training and more) Volunteer opportunities and charitable giving Social events, happy hours, treats and celebrations throughout the year Workshops and continuous learning opportunities At Tower, you ll find a collaborative and welcoming culture, a diverse team and a workplace that values both performance and enjoyment. No unnecessary hierarchy. No ego. Just great people doing great work - together. Tower Research Capital is an equal opportunity employer.
Posted 2 weeks ago
3.0 - 8.0 years
5 - 10 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
AREAS OF RESPONSIBILITY To be alertat all times and guard any area entrusted to their care To inspect/frisk all employees and check their belongings while entering or leaving theHotel premises To ensurethat employees swipe/ punch their time cards while entering and leaving thehotel premises To reportany deviations to the supervisor immediately To followthe key issue procedure while issuing keys to employees, and record the same asprescribed To ensurethat no visitor is permitted entry through the employee entrance without properchecking and a visitors pass To ensurethat no tangible item leaves the Hotel premises without a valid gate pass To check allmaterial entering the hotel through the receiving entrance and ensure propercheck and record is maintained To patrolthe property as and when assigned to do so, by covering all areas with avigilant eye. To assistguests when entering or leaving the hotel To handleguest queries and complaints in a polite and efficient manner In case of afire emergency, to follow the prescribed procedure in ensuring the safety ofall guests, guest belongings and all Hotel employees Similarly tofollow prescribed procedures in handling other emergencies To carry outany duties assigned by the Security Supervisor/ Security Officer To adhere tostrict grooming and hygiene standards Toconsciously and continuously strive to better his/her skills and increasehis/her knowledge Creates 100%guest satisfaction by providing the Yes I Can! experience through performancethat demonstrates the standards of, genuine hospitality and exceeding guestexpectations Givespersonal attention, takes personal responsibility and uses teamwork whenproviding guest service and experience Listens,apologizes with empathy, finds a solution and follows through when resolvingguest problems Provides YesI Can! genuine hospitality and teamwork on an ongoing basis Assumes theresponsibility to notice when the guest is not satisfied and uses their bestjudgment as to when it is appropriate to use the 100% Guest Satisfaction Performsother duties required to provide the service brand behavior and genuinehospitality Adheres tohotel policies and procedures: Attends workon time as scheduled Followshotel grooming and hygiene standards Minimisessafety hazards by following all safety rules and procedures Keepsimmediate manager promptly and fully informed of all problems or unusualmatters of significance Performs allduties and responsibilities in a timely and efficient manner in accordance withestablished company policies and procedures to achieve the overall objectivesof this position Maintains afavourable working relationship with all other company employees to foster andpromote co-operative and harmonious working climate At all timeprojects a favourable image of Brand to the public
Posted 2 weeks ago
16.0 - 18.0 years
45 - 50 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
Roles and Responsibilities. Service Delivery Management - Oversee the end-to-end delivery of cloud infrastructure and security services to ensure alignment with client requirements and organizational goals Ensure the delivery of services meets agreed-upon SLAs (Service Level Agreements) and KPIs (Key Performance Indicators). Develop and maintain detailed project plans, timelines, and budgets, ensuring projects are delivered on time and within budget. Manage client escalations, ensuring that issues are resolved promptly and to the clients satisfaction. Identify opportunities for account growth and work closely with sales and account management teams to capitalize on them Review proposed modifications on project plans, including meeting with interested parties to approve and implement beneficial changes Anticipate details of transformation deals and opportunities by communicating directly with customers and staying informed of relevant trends and industry news/Account mining. Experience handling vendors from a reporting, Procurement, and service management perspective Financial Management: Monitor financial performance, ensuring that delivery costs are within budget and profit margins are maintained. Identify and implement cost-saving initiatives without compromising service quality. Handle all Invoicing matters for Project activities and co-ordinate between Finance team and customer Continuous Improvement - Stay up to date with the latest trends, technologies, and best practices in cloud computing and cybersecurity. Identify opportunities for innovation and work with the technical teams to implement new solutions that enhance service delivery. Foster a culture of innovation within the delivery team, encouraging the exploration of new tools, techniques, and approaches. Drive Automation across the accounts. Analytics: Develop and deliver regular reports on service delivery performance, including metrics on availability, reliability, and security. Analyze service delivery data to identify trends, issues, and opportunities for improvement Technical Must have Executed cloud, Security and data centre infrastructure projects covering all stacks starting from perimeter network, multi-cloud, Virtualization stack, server stack, office 365, Cloud migration, BCP & DR, DevOps backup & recovery projects Proven, good knowledge of Cloud, data centre & security infrastructure technologies (VMware, Checkpoint, F5, Palo Alto, Extreme) Understanding of the latest Cloud, data centre security & cybersecurity technology Must have executed large transformational deals which involved data centre migration/Consolidation, End-user services transformation Education / Qualifications Preferably ITSM/SIAM certified Experience Proven 16 to 18 years of experience in managing Cloud, Infrastructure, End user computing, Network, security operations and projects/programs in the infrastructure space Roles and Responsibilities. Service Delivery Management - Oversee the end-to-end delivery of cloud infrastructure and security services to ensure alignment with client requirements and organizational goals Ensure the delivery of services meets agreed-upon SLAs (Service Level Agreements) and KPIs (Key Performance Indicators). Develop and maintain detailed project plans, timelines, and budgets, ensuring projects are delivered on time and within budget. Manage client escalations, ensuring that issues are resolved promptly and to the clients satisfaction. Identify opportunities for account growth and work closely with sales and account management teams to capitalize on them Review proposed modifications on project plans, including meeting with interested parties to approve and implement beneficial changes Anticipate details of transformation deals and opportunities by communicating directly with customers and staying informed of relevant trends and industry news/Account mining. Experience handling vendors from a reporting, Procurement, and service management perspective Financial Management: Monitor financial performance, ensuring that delivery costs are within budget and profit margins are maintained. Identify and implement cost-saving initiatives without compromising service quality. Handle all Invoicing matters for Project activities and co-ordinate between Finance team and customer Continuous Improvement - Stay up to date with the latest trends, technologies, and best practices in cloud computing and cybersecurity. Identify opportunities for innovation and work with the technical teams to implement new solutions that enhance service delivery. Foster a culture of innovation within the delivery team, encouraging the exploration of new tools, techniques, and approaches. Drive Automation across the accounts. Analytics: Develop and deliver regular reports on service delivery performance, including metrics on availability, reliability, and security. Analyze service delivery data to identify trends, issues, and opportunities for improvement Technical Must have Executed cloud, Security and data centre infrastructure projects covering all stacks starting from perimeter network, multi-cloud, Virtualization stack, server stack, office 365, Cloud migration, BCP & DR, DevOps backup & recovery projects Proven, good knowledge of Cloud, data centre & security infrastructure technologies (VMware, Checkpoint, F5, Palo Alto, Extreme) Understanding of the latest Cloud, data centre security & cybersecurity technology Must have executed large transformational deals which involved data centre migration/Consolidation, End-user services transformation Education / Qualifications Preferably ITSM/SIAM certified Experience Proven 16 to 18 years of experience in managing Cloud, Infrastructure, End user computing, Network, security operations and projects/programs in the infrastructure space
Posted 2 weeks ago
7.0 - 12.0 years
5 - 9 Lacs
Mumbai
Work from Office
Key Responsibilities: Leadership and Team Management: Lead and manage the Internal Red Team and SOC Operations teams, ensuring effective collaboration and alignment with organizational security objectives. Provide mentorship and guidance to team members, fostering a culture of continuous learning and professional development. Conduct regular performance reviews and provide ongoing feedback and coaching. Red Team Operations: Plan, execute, and oversee red team exercises to identify and exploit vulnerabilities in systems, networks, and applications. Develop and maintain red team methodologies, tools, and documentation. Work closely with other security teams to remediate identified vulnerabilities and improve security defenses. SOC Operations Management: Oversee the daily operations of the SOC, ensuring efficient and effective monitoring, detection, and response to security incidents. Develop and maintain SOC processes, procedures, and documentation to ensure consistent and high-quality operations. Ensure the SOC is staffed 24/7, including managing schedules, shifts, and on-call rotations. Incident Response and Management: Coordinate and lead the response to major security incidents, including investigation, containment, eradication, and recovery. Develop and maintain an incident response plan and ensure the team is well-trained and prepared to handle incidents. Conduct post-incident reviews and develop lessons learned to improve future response efforts. Threat Intelligence and Analysis: Oversee the collection, analysis, and dissemination of threat intelligence to inform security operations and red team activities. Ensure the SOC team utilizes advanced threat detection tools and techniques to identify and mitigate threats. Collaborate with other teams to enhance threat intelligence capabilities and integrate with existing processes. Security Monitoring and Reporting: Ensure continuous monitoring of network traffic, system logs, and security alerts using SIEM (Security Information and Event Management) solutions. Develop and maintain metrics and dashboards to report on SOC and red team performance and security posture. Present regular reports and briefings to senior management on the state of security operations and key incidents. Policy and Compliance: Develop and enforce security policies, procedures, and standards in alignment with industry best practices and regulatory requirements. Ensure compliance with relevant regulations, such as GDPR, and PCI-DSS. Participate in security audits and assessments, and coordinate with external auditors as needed. Qualifications: Bachelors degree in Computer Science, Information Security, or a related field. Equivalent work experience may be considered. Minimum of 7 years of experience in cybersecurity, with at least 3 years in a management or leadership role overseeing red team and/or SOC operations. Strong understanding of offensive security practices, including penetration testing and red teaming methodologies. Experience with SOC operations, including incident response, threat detection, and SIEM tools such as Splunk, ArcSight, or QRadar. Knowledge of common attack vectors and techniques, such as phishing, malware, and ransomware. Familiarity with regulatory requirements and frameworks, such as NIST, ISO 27001, and GDPR. Relevant certifications, such as CISSP, CISM, OSCP, CEH, or GIAC, are highly desirable. Excellent leadership, communication, and interpersonal skills. Ability to work effectively under pressure and manage multiple priorities.
Posted 2 weeks ago
3.0 - 5.0 years
6 - 10 Lacs
Bengaluru
Work from Office
: Job Title - Information Security Analyst, Associate Location - Bangalore, India Role Description Information Security Risk Analyst - TDI CSO The Technology Data Innovation (TDI) Chief Security Office (CSO) comprises both Corporate Security and Information Security. We run security operations globally to protect the banks people, infrastructure, processes, and information. CSO Governance and Control conducts proactive Information Security (IS) controls assess ability and applicability reviews for the emerging technologies to design adaptable IS assessment framework to appropriately assess the security requirement for relevant applications and infrastructures. The Information Security Analyst role holder is responsible for supporting the execution of the Information Security strategy. The Information Security Analyst provides data and analysis to measure the effectiveness of Information Security controls across group wide products and services. The Information Security Analyst identifies and evaluates potential areas of Information Security threats by assessing the probability and impact and facilitates feedback for mitigation. Roles within Information Security may cover one or more areas of specialty, e.g. Identity & Access Management (which may include, for example, authentication; access management & control; recertification etc.); Information Security (IS) Operations (which may for example include, cyber threat operations; cyber forensics, protection against data leakage etc.) and IS Technology (which may include IS architecture, IS engineering, cryptographic services etc.) What we'll offer you As part of our flexible scheme, here are some of the benefits that you will enjoy. Best in class leave policy. Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Review Risk Assessment (Application/Technical Risk profile) and Assurance spot checks for Compliance evaluation of IS controls (e.g., IS/Cloud/SOx/MAS/Client Access Management/other regulatory controls) Analysis and verification of compliance issues. Analyze and identify root causes. Collect and review evidence (e.g., from de-centrally managed applications) Communicates openly with internal stakeholders; keeps them informed of potential findings and escalate problems/delays accordingly. Acts as a competent partner to stakeholders in the closure process of findings and remediation activities. Provide and prepare data / reports for stakeholders and management communication. Conduct application risk assessments and support business stakeholders to determine the CIA ratings. Focus on utilizing the capacity in an efficient and effective manner. Proactively develop and maintain professional working relationships with the CSO function and stakeholders Represent the process and provide inputs / suggestion with any challenges faced to improve the quality. Improvement and documentation of operational tracking activities Raise Business to Central Solutions run by other CSO teams. Your skills and experience Work experience in the Information Technology area / Information security area Practical experience in Governance or Compliance Monitoring beneficial. Knowledge about basic principles of Risk, Identity and Access Management beneficial Certifications in ISO 27001 or on information security (e.g., CISSP, CISA) would be beneficial. Effective communication and strong interpersonal skills in English (verbal and written). German language would be beneficial. Positive attitude and proactive behavior with diligence and precision Self-driven, eager to learn, well organized collaborator to integrate with heterogeneous teams. Structured way of thinking and working with good analytical and critical thinking skills Ability to monitor, track and clearly communicate progress, escalate issues when appropriate, not shunning to address issues to higher management levels. Experience in Excel (advanced), added advantage to languages such as Python/VB/SQL etc., How we'll support you Training and development to help you excel in your career. Coaching and support from experts in your team A culture of continuous learning to aid progression. A range of flexible benefits that you can tailor to suit your needs. About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htm We strive for a culture in which we are empowered to excel together every day. This includes acting responsibly, thinking commercially, taking initiative and working collaboratively. Together we share and celebrate the successes of our people. Together we are Deutsche Bank Group. We welcome applications from all people and promote a positive, fair and inclusive work environment.
Posted 2 weeks ago
3.0 - 5.0 years
6 - 10 Lacs
Pune
Work from Office
: Job Title - Information Security Analyst, NCT Location - Pune, India Role Description Information Security Risk Analyst - TDI CSO The Technology Data Innovation (TDI) Chief Security Office (CSO) comprises both Corporate Security and Information Security. We run security operations globally to protect the banks people, infrastructure, processes, and information. CSO Governance and Control conducts proactive Information Security (IS) controls assess ability and applicability reviews for the emerging technologies to design adaptable IS assessment framework to appropriately assess the security requirement for relevant applications and infrastructures. The Information Security Analyst role holder is responsible for supporting the execution of the Information Security strategy. The Information Security Analyst provides data and analysis to measure the effectiveness of Information Security controls across group wide products and services. The Information Security Analyst identifies and evaluates potential areas of Information Security threats by assessing the probability and impact and facilitates feedback for mitigation. Roles within Information Security may cover one or more areas of specialty, e.g. Identity & Access Management (which may include, for example, authentication; access management & control; recertification etc.); Information Security (IS) Operations (which may for example include, cyber threat operations; cyber forensics, protection against data leakage etc.) and IS Technology (which may include IS architecture, IS engineering, cryptographic services etc.) What we'll offer you As part of our flexible scheme, here are some of the benefits that you will enjoy. Best in class leave policy. Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Review Risk Assessment (Application/Technical Risk profile) and Assurance spot checks for Compliance evaluation of IS controls (e.g., IS/Cloud/SOx/MAS/Client Access Management/other regulatory controls) Analysis and verification of compliance issues. Analyze and identify root causes. Collect and review evidence (e.g., from de-centrally managed applications) Communicates openly with internal stakeholders; keeps them informed of potential findings and escalate problems/delays accordingly. Acts as a competent partner to stakeholders in the closure process of findings and remediation activities. Provide and prepare data / reports for stakeholders and management communication. Conduct application risk assessments and support business stakeholders to determine the CIA ratings. Focus on utilizing the capacity in an efficient and effective manner. Proactively develop and maintain professional working relationships with the CSO function and stakeholders Represent the process and provide inputs / suggestion with any challenges faced to improve the quality. Improvement and documentation of operational tracking activities Raise Business to Central Solutions run by other CSO teams. Your skills and experience Work experience in the Information Technology area / Information security area Practical experience in Governance or Compliance Monitoring beneficial. Knowledge about basic principles of Risk, Identity and Access Management beneficial Certifications in ISO 27001 or on information security (e.g., CISSP, CISA) would be beneficial. Effective communication and strong interpersonal skills in English (verbal and written). German language would be beneficial. Positive attitude and proactive behavior with diligence and precision Self-driven, eager to learn, well organized collaborator to integrate with heterogeneous teams. Structured way of thinking and working with good analytical and critical thinking skills Ability to monitor, track and clearly communicate progress, escalate issues when appropriate, not shunning to address issues to higher management levels. Experience in Excel (advanced), added advantage to languages such as Python/VB/SQL etc., How we'll support you Training and development to help you excel in your career. Coaching and support from experts in your team A culture of continuous learning to aid progression. A range of flexible benefits that you can tailor to suit your needs. About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htm We strive for a culture in which we are empowered to excel together every day. This includes acting responsibly, thinking commercially, taking initiative and working collaboratively. Together we share and celebrate the successes of our people. Together we are Deutsche Bank Group. We welcome applications from all people and promote a positive, fair and inclusive work environment.
Posted 2 weeks ago
7.0 - 8.0 years
40 - 50 Lacs
Bengaluru
Work from Office
As a Lead Developer in the Distributed Systems space, you'll work with the teams that builds large-scale solutions for cyber security use cases. We collect millions of data points per second from our customers s data sources. Our teams design, builds and runs distributed systems that archive and search that data, to improve our customers security posture. The Lead developer is responsible for providing multiple teams technical direction to deliver high value, performant software solutions. The lead developer will provide technical guidance and direction to multiple teams of developers through the design, implementation and automated/integration testing of our software. They will also provide guidance on best practices for running, monitoring, and maintaining our system. In addition, they indirectly influence the work of the department and closely related Arctic Wolf teams. Responsibilities Include: Act as a mentor to R&D technical leaders. Apply broad expertise and knowledge in highly-specialized fields or several related disciplines. Lead and contribute to the development of company objectives and principles to achieve goals in creative and effective ways. Produce specifications and determine operational feasibility. About You you're a highly-advanced software developer who makes important product decisions regarding direction and scope. You make strategic decisions about which team members should work on which areas of a project, and provide technical and professional leadership for the developers. You identify and collaborate with multiple teams or organizations, and have a deep understanding of software systems that span multiple teams. In addition, you are comfortable presenting to the executive team. You should have extensive work experience in the following areas: Significant experience with working on backend systems Excited about working in the big data space Relevant experience developing software in either Python, Go, or other similar languages Comprehensive experience in software development of event-driven services and web APIs. Experience with Amazon Web Services or other cloud platforms, preferably with distributed object storage and parallel computing (S3, Lambda, DynamoDB). Ability to work cohesively within a team and habitually spread knowledge in various forms (verbally, documentation) Ability, comfort, and interest in picking up new technologies and frameworks which you may not be familiar with Understanding of Kubernetes. In addition, you have proven leadership experience from previous projects, regardless of title held. You have the ability to perform programming tasks and large engineering projects with Independence and expertise. You will be responsible for guiding and mentoring other staff members and will regularly lead technical projects. You have a high level of mastery over software development best practices and building reusable design patterns. Previous security experience is preferred but not required. We provide all the cybersecurity training you need during onboarding and on-the-job training. All wolves receive compelling compensation and benefits packages, including: Equity for all employees Flexible annual leave, paid holidays and volunteer days Training and career development programs Comprehensive private benefits plan including medical insurance for you and your family, life insurance (3x compensation), and personal accident insurance. Fertility support and paid parental leave Security Requirements Conducts duties and responsibilities in accordance with AWN s Information Security policies, standards, processes and controls to protect the confidentiality, integrity and availability of AWN business information (in accordance with our employee handbook and corporate policies). Background checks are required for this position.
Posted 2 weeks ago
7.0 - 12.0 years
12 - 17 Lacs
Bengaluru
Work from Office
Responsible for Physical Security and Crisis Management (SCM) program for the protection of assets and employees. Has knowledge of best practices and how own area integrates with others. The position will be responsible for driving all aspects of the Security and Crisis Operations at the site/s in India & SA. GE HealthCare is a leading global medical technology and digital solutions innovator. Our mission is to improve lives in the moments that matter. Unlock your ambition, turn ideas into world-changing realities, and join an organization where every voice makes a difference, and every difference builds a healthier world. Role & Responsibilities: Implement and manage the Security and Crisis Management (SCM) Program. Coordinate the installation, replacement, and maintenance of security systems. Manage and advise on the site s security guard services. Promote awareness of GEHC security-related policies, procedures, and guidelines. Assist the Plant/Site management in developing and managing the Emergency Response Plan (ERP) & the Team (ERT). Ensure the reporting of all security incidents involving crime, security violations, critical security intelligence and incident trends via GEHC reporting system (Gensuite), review incoming reports and provide guidance and follow up to close the incidents. Attend and participate in country SSL meetings & Participate in Crisis Management and Workplace Violence drills. Plan and perform annual Emergency Response and Workplace Violence drills. Work with the GEHC Regional Security Director to report identified physical security gaps/risks, incident trends, and improvement plans. Promote security education and awareness to employees/leadership with help of RSD. Manage and maintain the Benchmark Gensuite Risk Assessment and Profiler page. Act as site liaison with government law enforcement agencies and local communities. Assist with the travel security arrangements & executive protection support. Conduct security audits & inspections of the site. Participate in other GEHC audits and inspections as required by the GEHC Global Security Operations. Partnering with IT, ensure company confidential information/intellectual property is properly protected. Conduct internal investigations on criminal activity, security violations and special investigations in concurrence with the legal and human resources departments. Manage security and crisis issues and support country disaster preparedness and recovery activities for natural disasters, such as hurricanes and earthquakes for all GEHC sites in the region according to global security/crisis management requirements. Provide regional SCM metrics to RSD & Global SCM team. Required Qualifications: Graduate with 10+ years experience in physical security, systems & crisis management, a veteran (uniform service officer) preferred. Professional security certification is an added advantage. Good command over English, Hindi & Kannada language (spoken, reading & written). Need to establish strong network with Law & Order officials in The AoR. Self-motivated and directed, flexible, and able to work under pressure in fast paced environment. High level of interpersonal, verbal, and written communication skills, with an emphasis on collaboration, and the ability to communicate with decision-makers. Project management skills (multi-faceted & complex projects) with ability to handle multiple tasks and deliver results on time. Experience in security investigations, especially in manufacturing (unionised) environment. Experience with business resilience and crisis/emergency response management. Liaison experience with local, state, and national law enforcement, government regulatory agencies and private industrial security. Demonstrated business acumen, and financial management skills with ability in conflict resolution and consensus building. Ready to travel with multi-tasking and effective time management. Desired Characteristics: Strong ownership & accountability, with a proven track record of execution. Strong analytical and strong problem-solving skills; effectively evaluates information/data to make decisions. Anticipates obstacles and develops plans to resolve those. Demonstrated ability to interact effectively at all levels of organization. Clear thinking / problem solving, successfully led cross-functional/process improvement projects.; able to quickly grasp new ideas. Able to clearly communicate complex information in an easy-to-understand manner; able to deliver message effectively verbally and in writing
Posted 2 weeks ago
2.0 - 8.0 years
4 - 10 Lacs
Bengaluru
Work from Office
As the Security Officer, you will be responsible for performing the following tasks to the highest standards: Maintain the order and safety of the hotel. Offer necessary service to guests. Conduct regular safety patrol, acting and reporting appropriately upon discovering any potential hazards. Take good care of communication facilities and skillfully operate all fire control equipment. Report, examine and monitor with professionalism once suspicious personnel or articles are discovered, keeping a record of these incidents as we'll. Security Officer working at staff entrance should do as follows: Ensure that the external visitor registration form is filled correctly. Be hospitable to visitors and report any suspicions to the Management. Conduct random bag inspections of team members entering and leaving the building, ensuring that the Asset Removal Policy is adhered to. Prevent any flammable or explosive items, corrosives, drugs, hazardous tools, liquor or items labelled identically as the hotel s property from being brought into the hotel. Identically labelled items or items with the same brand as the hotel s property, to be detained and recorded with the name and employee number of the staff involved. Prevent hotel s property from being removed without an authorized and signed Gate-Pass permission form. Write-off the Gate-Pass permission form once lent-out articles are returned. Implement payment for damaged items and provide the invoice for the purchase or refund. Keep the deposited keys in good condition and fulfill the key-lent procedure. Maintain workplace cleanliness. Security Officer working at the hotel lobby should do as follows: Familiarize with all restaurants, locations and their operation times in order to direct guests to the most convenient route to their destinations. Take the initiative to usher guests into available elevators and assist with the selection of levels. (About 10 guests each time). Specially assist elderly, children and the disabled. Be alert of drunkards, the incapacitated and the people who accompany them. People who are excluded from pornography or other illegal activities should be monitored closely. When suspicious people enter the elevator, promptly inform CCTV and relevant departments to pay attention, preventing unauthorized visitors from entering the rooms. Discourage guests from bringing pets into the hotel area. Implement the relevant regulations of the local municipal Public Security Bureau and usher unauthorized visitors to the Front Desk to obtain the consent of the hotel s guest as we'll as to fill in the Visitor s Registration Form . Advice visitors to remain in guest rooms between 23:00 and 8:00. Make sure all commercial photography carried out in the hotel s premises have clearance from the hotel s Marketing & Communications department, otherwise, direct them to the relevant department. Inform the Duty Manager and Front Desk team members to register with the Housekeeping department if guests belongings are found. Dissuade guests from carrying hotel property to prevent the loss of goods in public areas. Pay special attention to those who come in with empty hands or bags and leave with bags. Pay attention to the corridor of the 2F Banquet ballrooms and remind guests not to leave their children to play along the banisters. Security Officer should do as follows in patrolling: Upon receiving the patrol route and schedule, patrol area, paying attention to personnel, hotel equipment, fire and safety facilities. Report all potential threats or discrepancies. Inspect the key parts of the machine room, distribution room, kitchen, windpipe / water pipe, storages, fire control corridor, escape indicator in the public area and firefighting equipment. Check and ensure that the backend office door is locked after team members have left. Office team members should check whether the door of the office is locked after work but if it is not locked, assist to lock it. If there is any abnormality in the office, the supervisor will report it. Inspect the locker room and team members restrooms, prohibiting noise, gambling, smoking, storage of inflammable, explosive goods and anything that releases strong odors. Effectively manage issues encountered during duty and report to the duty supervisor or Assistant Safety & Security Manager promptly when needed. Be responsible to check fire facilities, fire security and manage the fire alarm. Be familiar with first aid and fire emergency procedures. Carry out other reasonable duties and responsibilities as assigned. The Management reserves the right to make changes to this job description at its sole discretion and without advance notice. What are we looking for A Security Officer serving Hilton Brands is always working on behalf of our Guests and working with other Team Members. To successfully fill this role, you should maintain the attitude, behaviours, skills, and values that follow: High School or Secondary Vocational School graduate. Proficient with hotel security operations. Possess a strong sense of responsibility and service. Good work attitude and always alert. Able to communicate effectively and clearly. Knowledgeable of resources and utilize them efficiently. Literacy in English to meet business needs, preferred.
Posted 2 weeks ago
5.0 - 8.0 years
3 - 7 Lacs
Chennai
Work from Office
Job Information Job Opening ID ZR_1924_JOB Date Opened 06/05/2023 Industry Technology Job Type Work Experience 5-8 years Job Title Splunk Content Development City Chennai Province Tamil Nadu Country India Postal Code 600001 Number of Positions 5 We are looking for a content development engineer or L2 level SOC SIEM engineer with hands-on experience in developing new rules, use cases based on various log sources including Cloud Security log sources and integrating various log sources with SIEM Platform. Roles and Responsibilities: Creating and implementing new threat detection content, rules and use cases to deploy in SIEM platform with different data sets like Proxy, VPN, Firewall, DLP, etc. Assisting with process development and process improvement for Security Operations to include creation/modification of SOPs, Playbooks, and Work instructions. Developing custom content based on threat intelligence and threat hunting results. Identifying gaps in the existing security controls and develop/propose new security controls. SIEM Engineering and knowledge of integrating various log sources with any SIEM platform. Custom parsing of logs being ingested into the SIEM Platform Job : 3+ years of experience working in the field of Content development and experience in delivering and/or building content on any of the SIEM tools like Splunk/Arc-sight /QRadar/Nitro ESM/etc. Deep understanding of MITRE ATT&CK Framework. Experience in SOC Incident analysis with an exposure to information security technologies such as Firewall, VPN, Intrusion detection tools, Malware tools, Authentication tools, endpoint technologies, EDR and cloud security tools. Good understanding of networking concepts. Experience interpreting, searching, and manipulating data within enterprise logging solutions (e.g. SIEM, IT Service Management (ITSM) tools, workflow, and automation) In depth knowledge of security data logs and an ability to create new content on advanced security threats on a need basis as per Threat Intelligence. Ability to identify gaps in the existing security controls. Good experience in writing queries/rules/use cases for security analytics (ELK, Splunk or any other SIEM platform) and deployment of content. Experience on EDR tools like Crowd-strike and good understanding on TTPs like Process Injection. Excellent communication, listening & facilitation skills Ability to demonstrate an investigative mindset. Excellent problem-solving skills. Preferred : Understanding of MITRE ATT&CK framework. Demonstrable experience in Use case /rule creation on any SIEM Platform. Chronicle Backstory/ YARA / Crowds trike rules is a plus. Location: Pan India check(event) ; career-website-detail-template-2 => apply(record.id,meta)" mousedown="lyte-button => check(event)" final-style="background-color:#2B39C2;border-color:#2B39C2;color:white;" final-class="lyte-button lyteBackgroundColorBtn lyteSuccess" lyte-rendered=""> I'm interested
Posted 2 weeks ago
1.0 - 6.0 years
2 - 4 Lacs
Noida, Greater Noida, Delhi / NCR
Work from Office
Roles and Responsibilities Manage day-to-day operations of facilities, ensuring smooth functioning of all aspects. Oversee security services, including manpower handling, guarding, and physical security measures. Supervise site operations and facility maintenance to ensure compliance with safety standards. Coordinate recruitment efforts for field positions and manage manpower effectively. Conduct regular inspections to identify areas for improvement in facility operations. Desired Candidate Profile 1-6 years of experience in Manpower Operations or related field. Strong understanding of Field Operations, Field Work, Manpower Management, Recruitment, Manpower Handling, Supervision, Man Management, Site Operations, Physical Security, Guarding. Ability to work independently with minimal supervision.
Posted 2 weeks ago
6.0 - 11.0 years
19 - 25 Lacs
Noida, Ghaziabad, Delhi / NCR
Work from Office
We are seeking a skilled IT Project Manager to lead and deliver technology-driven initiatives across infrastructure, software, or digital transformation projects. The IT PM will be responsible for planning, executing, and closing projects, ensuring they are completed on time, within budget, and aligned with business goals. ** Required ** Strong knowledge of Agile, Scrum, and Waterfall methodologies Excellent communication, leadership, and stakeholder management skills Use tools like JIRA, Asana, or MS Project for task tracking and reporting Hands-on experience in cloud migration, cybersecurity, Network Operations, Security Operations, DevOps, FinOps **Preferred** PMP, CSM, or equivalent certification preferred ITIL?? 4 Foundation / Managing Professional Certified Information Systems Security Professional (CISSP) share me your Resume - Prashants7@chetu.com
Posted 2 weeks ago
4.0 - 5.0 years
3 - 4 Lacs
Visakhapatnam
Work from Office
Role & responsibilities: 1. Security Management: Implementing and managing security systems, including access control, CCTV, alarms, and other electronic security measures 2. Risk Assessment and Mitigation: Identifying potential security vulnerabilities and developing strategies to mitigate risks 3.Incident Response: Responding to security incidents and emergencies in a timely and effective manner 4.Investigation: Investigating security breaches, fraud, and other misconducts, and collaborating with law enforcement when necessary 5.Patrolling and Monitoring: Conducting regular patrols of the facility and monitoring security systems to detect and deter potential threats. 6.Vigilance and Anti-Corruption: Identifying and investigating potential corruption and misconduct within the organization. 7.Communication and Reporting: Maintaining clear communication with security personnel, management, and relevant authorities, and preparing detailed reports on security incidents
Posted 2 weeks ago
5.0 - 8.0 years
6 - 10 Lacs
Gurugram
Work from Office
Skill required: Sourcing & Procurement - Sourcing Designation: Func & Ind Intelligence Senior Analyst Qualifications: BE/Any Graduation Years of Experience: 5 to 8 years Language - Ability: English(Domestic) - Advanced What would you do? Go beyond processing purchase orders at lower costs to help clients reap savings and value from the billions they spend on the goods and services that run their day-to-day business operations. You will be working as a part of Procurement management team which uses a systematic approach for buying all the goods and services needed for a company to stay sustainable. They are involved in the identification of need, finding and qualifying the suppliers, requesting proposals, negotiating with suppliers, contracting, delivery and analyzing results.Understand when & how to use a request for proposal (price and non-price factors) and RFQ (price only) and how to develop, execute and analyze the results. Collect and analyze quantitative and qualitative information to assess, screen and select suppliers. What are we looking for? End to End sourcing & procurement.End to End sourcing & procurement. Roles and Responsibilities: In this role you are required to do analysis and solving of increasingly complex problems Your day to day interactions are with peers within Accenture You are likely to have some interaction with clients and/or Accenture management You will be given minimal instruction on daily work/tasks and a moderate level of instruction on new assignments Decisions that are made by you impact your own work and may impact the work of others In this role you would be an individual contributor and/or oversee a small work effort and/or team Please note that this role may require you to work in rotational shifts Qualification BE,Any Graduation
Posted 2 weeks ago
12.0 - 17.0 years
45 - 50 Lacs
Gurugram
Hybrid
Experience: 12+ years of experience in Security Domain At least 5+ experience in managing and leading a global security operation centre. Prior experience of 5+ years in handling a team of at least 10 people Essential capabilities: Excellent understanding and experience with: Running and improving mature security operations centres Team leadership with energy and passion Managing operational teams Working in large/complex environments Demonstrated ability to stay calm and lead under pressure Excellent verbal and written communication skills Excellent time management and prioritisation skills Excellent consulting and stakeholder management Excellent coaching, leadership and soft skills Demonstrated ability to influence Demonstrated willingness to engage in self-learning or security research outside of standard business hours Strong analytical, problem solving and lateral thinking skills Excellent subject-matter and technical skills: incident response methodologies and techniques detection and mitigation strategies for a broad range of cyber threats, including malware, DDOS, hacking, phishing, lateral movement and data exfiltration common cloud platforms/technologies, such as Azure, AWS and Google cloud common enterprise technologies, such as Windows, Linux, Active Directory, DNS, DHCP, web proxies, SMTP, TCP/IP, AWS, Azure operational usage of common analysis and response tooling performing penetration testing, including network, infrastructure and application exploitation and exploit development NIST framework MITRE ATT&CK, Lockheed Martin Cyber Kill Chain or similar methodologies Interested Candidates can share their Updated Resume at [pooja.sharma@black-turtle.co.in]
Posted 2 weeks ago
1.0 - 3.0 years
3 - 5 Lacs
Bengaluru
Work from Office
POSITION SUMMARY: This position will give an opportunity to work for Information Security Governance on information systems, processes, and technologies within the organization. This is a global role engaging stakeholders (at all levels) across geographies like India, Philippines, and US This position will report to the Senior Manager, Information Security and is expected to work independently on tasks assigned. This position requires: Works on Vendor IT Security risk assessment/ Third Party Risk management Monitor Security posture and appraise Senior Leadership on the posture. Conduct phishing campaigns that includes analysis of phishing emails and develop reports. Experience in performing Risk Assessments in line with Information Security Standards (like ISO 27001) for Business processes and IT systems. Knowledge about latest regulations, compliance, standards, and procedures such as GLBA, SOX, ISO27000 Standards, CoBiT, etc. Excellent verbal and written communication skills with a demonstrated ability to build and maintain relationships within the organization. Strong proficiency in Microsoft Office applications (MS Excel, Word, PowerPoint etc.) with a general understanding of data analysis techniques JOB FUNCTIONS AND RESPONSIBILITIES Perform IT security reviews, evaluations, risk assessments, and monitoring on a regular basis to ensure exceptions and violations are identified and addressed. Perform and oversee Information Security Policy Framework Recommend appropriate corrective actions and remediation plans for risks identified. Assist in developing the implementation of risk mitigation measures. Work with the Business functions to ensure security standards are in-line with Onity s risk management and information security policies. Plan and execute vendor IT and Security audit programs in-line with Onity s risk management policies. EDUCATION / EXPERIENCE 1-3 years of progressive experience in one or more of the following: internal/external IT and business process auditing, sourcing advisory, vendor management roles Bachelor s degree from an accredited college / university. Management degrees MS, M. Tech or MBA in relevant field would be an added advantage. Preferred Certifications CGEIT or CISM CISSP ISO 27001 Demonstrated experience in conducting Risk Assessments for Vendors, Internal and External stakeholders. Experience in Information Security or demonstrated knowledge on Information Security Operations. Demonstrated experience in a multi-vendor environment. Demonstrated experience in Cloud Security assessments on various Cloud platforms such as AWS, Azure, Oracle etc. WORK SCHEDULE OR TRAVEL REQUIREMENTS 2 PM to 11 PM
Posted 2 weeks ago
2.0 - 3.0 years
4 - 5 Lacs
Chennai
Work from Office
Lennox (NYSE: LII) Driven by 130 years of legacy, HVAC and refrigeration success, Lennox provides our residential and commercial customers with industry-leading climate-control solutions. At Lennox, we win as a team, aiming for excellence and delivering innovative, sustainable products and services. Our culture guides us and creates a workplace where all employees feel heard and welcomed. Lennox is a global community that values each team member s contributions and offers a supportive environment for career development. Come, stay, and grow with us. Job Description Vulnerability Scanning & Analysis: Conduct daily operational activities in Rapid7 InsightVM, including initiating and reviewing vulnerability scans. Add or remove assets from scan scopes as per infrastructure changes or business requirements. Analyze vulnerability data and prioritize findings based on severity, exploitability, and business impact. False Positive detection analysis. Risk Management & Remediation: Collaborate with IT and business stakeholders to drive timely patching and remediation of identified vulnerabilities. Track and follow up on remediation progress; escalate delays as necessary. Support documentation and processing of risk acceptances , including impact assessments and stakeholder sign-offs. Stakeholder Engagement: Coordinate and communicate with application owners, system administrators, and other stakeholders for scan scheduling, scope adjustments, and remediation actions. Provide regular reports and dashboards to management and technical teams highlighting vulnerability trends, exceptions, and compliance status. Patch Management Support: Work closely with patch management teams to align scan results with patch deployment cycles. Validate effectiveness of applied patches and update system records accordingly. Documentation & Continuous Improvement: Maintain accurate records of vulnerability management activities, scan scopes, and risk acceptances. Assist in improving scanning coverage, tuning scan configurations, and refining asset groups. Qualifications 3 5 years of hands-on experience in a vulnerability management or security operations role. Strong working knowledge of Rapid7 InsightVM or similar vulnerability management platforms. Familiarity with patch management processes and tools. Experience conducting PCI DSS compliance scans , including asset scope definition, remediation tracking, and validation reporting. Understanding of risk management concepts and experience handling risk acceptances. Proficient in analyzing vulnerability reports, identifying root causes, and recommending mitigation strategies. Sound understanding of network, operating systems (Windows/Linux), and application security fundamentals. Solid grasp of compliance requirements including PCI DSS , CIS benchmarks , and vulnerability SLAs . Experience with the Service-Now Vulnerability Response module is an added advantage. Strong communication and stakeholder management skills. Good understanding of network and system security fundamentals.
Posted 2 weeks ago
7.0 - 15.0 years
9 - 17 Lacs
Bengaluru
Work from Office
Required Skills Technology | Sentinel SIEM Tool Expert | Level 3 Support Technology | Securonix SIEM Tools Expert | Level 3 Support Technology | ArcSight SIEM Tools Administrator | Level 2 Support Technology | Cybersecurity General Administrator | Level 2 Support Technology | Network Traffic Analysis Administrator | Level 2 Support Education Qualification : Engineer - B.E / B.Tech / MCA Certification Mandatory / Desirable : Technology | CompTIA Security+/Certified SOC Analyst (CSA)/GIAC Security Essentials (GSEC)/Certified Ethical Hacker (CEH)/Cisco Certified CyberOps Associate/GIAC Certified Incident Handler (GCIH)/GIAC Security Operations Certified (GSOC) Delivery Skills required are: - Technical Expertise: - *Expert knowledge of threat detection techniques and tools. *Leading incident response efforts, including advanced techniques for containment, eradication, and recovery. *Conducting in-depth digital forensics investigations. *Expertise in configuring and optimizing SIEM (Security Information and Event Management) systems. Analytical Skills: - *Deep understanding of log analysis techniques and tools. *Identifying patterns and anomalies in large datasets. *Integrating threat intelligence into monitoring and response processes. *Staying updated on the latest threat intelligence and applying it to enhance security. Collaboration and Coordination: - *Working closely with other IT and security teams to ensure comprehensive security coverage. *Leading the coordination of response efforts during major incidents. *Ensuring effective communication and collaboration among all stakeholders. *Coordinating with external partners and vendors for specialized support. Continuous Improvement: - *Continuously evaluating and improving security processes and procedures. *Implementing lessons learned from incidents to enhance the overall security posture. *Contributing to the development and updating of security policies and procedures.
Posted 2 weeks ago
7.0 - 15.0 years
9 - 17 Lacs
Bengaluru
Work from Office
Required Skills Technology | Scripting and Automation | Level 2 Support Technology | Network Security Fundamentals | Level 3 Support Technology | Secured Configuration Management | Level 3 Support Technology | Incident and Breach Response | Level 2 Support Technology | Endpoint Encryption | Level 2 Support Education Qualification : Engineer - B.E / B.Tech / MCA Certification Mandatory / Desirable : Technology | Certified Endpoint Detection and Response Professional/Certified Endpoint Security Administrator/Microsoft Certified: MD-100/CompTIA CySA+/CISSP/CISM/Cisco Certified CyberOps Associate/VMware Certified Professional - Desktop and Mobility Delivery Skills required are: - Advanced Technical Proficiency: - *Mastery of endpoint security solutions such as antivirus, endpoint detection and response (EDR), endpoint protection platforms (EPP), and mobile device management (MDM) systems. *Ability to configure, manage, and troubleshoot advanced endpoint security technologies effectively. *Advanced skills in conducting vulnerability assessments, prioritizing vulnerabilities, and overseeing remediation efforts across endpoint devices. Strategic Oversight and Management: - *Strategic oversight of endpoint security operations, including policy development, deployment strategies, and performance monitoring. *Collaboration with IT teams, network security specialists, compliance officers, and senior management to integrate endpoint security initiatives with broader organizational security strategies. *Facilitation of collaborative efforts to improve endpoint security posture and incident response capabilities. Communication and Stakeholder Management: - *Clear and concise communication of complex technical concepts, security risks, and recommendations to stakeholders at all levels. *Ability to articulate endpoint security issues, incident findings, and remediation strategies effectively. *Comprehensive documentation of endpoint security incidents, investigations, and remediation activities. Continuous Improvement and Adaptability: - *Commitment to staying updated with the latest cybersecurity trends, emerging threats, and technologies through ongoing training, certifications, and industry participation. *Implementation of continuous improvement initiatives to enhance endpoint security operations and resilience against evolving threats.
Posted 2 weeks ago
10.0 - 16.0 years
35 - 40 Lacs
Bengaluru
Work from Office
Required Skills Technology | Scripting and Automation | Level 2 Support Technology | Network Security Fundamentals | Level 4 Support Technology | Project Management | Level 4 Support Technology | Incident and Breach Response | Level 4 Support Technology | Technology Integration | Level 4 Support Education Qualification : Engineer - B.E / B.Tech / MCA Certification Mandatory / Desirable : Technology | Certified EDR Professional/Certified Endpoint Security Administrator/Microsoft Certified: MD-100/CompTIA Cybersecurity Analyst/CISSP/CISM/Cisco Certified CyberOps Associate/VMware Certified Professional - Desktop and Mobility Delivery Skills required are: - Technical Expertise: - *Proficiency in managing and configuring endpoint security technologies such as antivirus, endpoint detection and response (EDR), endpoint protection platforms (EPP), and mobile device management (MDM) systems. *Ability to implement and manage advanced endpoint security controls and policies to protect against emerging threats. *Experience in conducting and overseeing vulnerability assessments across endpoint devices. Strategic Oversight and Management: - *Strategic oversight of endpoint security operations, including policy development, deployment strategies, and performance monitoring. *Development and optimization of endpoint security policies, standards, and procedures to align with organizational objectives and industry best practices. *Facilitation of collaborative efforts to enhance endpoint security posture and incident response capabilities. Communication and Stakeholder Management: - *Clear and concise communication of technical security issues, incident findings, and remediation strategies to stakeholders at all levels. *Regular reporting on endpoint security metrics, trends, and operational performance to senior management and other stakeholders. *Comprehensive documentation of endpoint security incidents, investigations, and remediation activities. Continuous Improvement and Adaptability: - *Commitment to staying updated with the latest cybersecurity trends, threats, and technologies through ongoing training, certifications, and professional development. *Implementation of continuous improvement initiatives to enhance endpoint security operations and resilience against evolving threats. Value Proposition: - Understand the existing environment and propose any opportunity of improvement. Look at nagging issues in the environment and come out with Get Around solutions by working with vendors and industry experts
Posted 2 weeks ago
6.0 - 9.0 years
5 - 11 Lacs
Hyderabad, Chennai
Hybrid
Hiring for SOC Analyst in one of our Top Banking company @ Chennai & Hyderabad location Job Title: SOC Analyst Experience : 6 - 9 Years Department: Cybersecurity / Information Security Location: Chennai & Hyderabad Employment Type: Hybrid Mode - 3 days WFO and 2 days WFH . Job Summary: We are seeking a skilled and detail-oriented Security Operations Center (SOC) Analyst to join our cybersecurity team. The SOC Analyst will be responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents using a variety of tools and techniques. This role is critical to maintaining and improving our organization's security posture by ensuring real-time threat detection and incident response. Key Responsibilities: Monitor security alerts and events from SIEM tools (e.g., Splunk, QRadar, Microsoft Sentinel). Analyze and triage events to determine impact and severity. Investigate security incidents and provide incident reports with detailed analysis. Escalate validated threats and vulnerabilities to the appropriate teams and assist in mitigation efforts. Coordinate with IT teams to ensure containment, eradication, and recovery actions are taken for confirmed incidents. Perform threat intelligence analysis to support proactive detection and defense. Document incident handling procedures and maintain an incident knowledge base. Participate in continuous improvement of SOC operations, including playbooks and automation. Stay current on the latest cybersecurity trends, threats, and tools. Required Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field; or equivalent work experience. 13 years of experience in a SOC or information security role. Experience with SIEM platforms, IDS/IPS, firewalls, and endpoint protection tools. Understanding of TCP/IP, DNS, HTTP, VPN, and network protocols. Knowledge of common threat vectors, MITRE ATT&CK framework, and kill chain. Strong analytical and problem-solving skills. Excellent communication skills and ability to work under pressure. Preferred Qualifications: Certifications such as CompTIA Security+, CEH, GCIA, GCIH, or Splunk Certified Analyst. Experience with scripting (e.g., Python, PowerShell) for automation. Familiarity with cloud security monitoring (e.g., AWS GuardDuty, Azure Defender). Exposure to incident response frameworks and forensic tools. Work Schedule: [24x7 shift-based / Regular business hours / On-call rotation as applicable]
Posted 2 weeks ago
1.0 - 3.0 years
3 - 6 Lacs
Bengaluru
Work from Office
POSITION SUMMARY: This position will give an opportunity to work for Information Security Governance on information systems, processes, and technologies within the organization. This is a global role engaging stakeholders (at all levels) across geographies like India, Philippines, and US This position will report to the Senior Manager, Information Security and is expected to work independently on tasks assigned. This position requires: Works on Vendor IT Security risk assessment/ Third Party Risk management Monitor Security posture and appraise Senior Leadership on the posture. Conduct phishing campaigns that includes analysis of phishing emails and develop reports. Experience in performing Risk Assessments in line with Information Security Standards (like ISO 27001) for Business processes and IT systems. Knowledge about latest regulations, compliance, standards, and procedures such as GLBA, SOX, ISO27000 Standards, CoBiT, etc. Excellent verbal and written communication skills with a demonstrated ability to build and maintain relationships within the organization. Strong proficiency in Microsoft Office applications (MS Excel, Word, PowerPoint etc.) with a general understanding of data analysis techniques JOB FUNCTIONS AND RESPONSIBILITIES Perform IT security reviews, evaluations, risk assessments, and monitoring on a regular basis to ensure exceptions and violations are identified and addressed. Perform and oversee Information Security Policy Framework Recommend appropriate corrective actions and remediation plans for risks identified. Assist in developing the implementation of risk mitigation measures. Work with the Business functions to ensure security standards are in-line with Onity s risk management and information security policies. Plan and execute vendor IT and Security audit programs in-line with Onity s risk management policies. EDUCATION / EXPERIENCE 1-3 years of progressive experience in one or more of the following: internal/external IT and business process auditing, sourcing advisory, vendor management roles Bachelor s degree from an accredited college / university. Management degrees MS, M. Tech or MBA in relevant field would be an added advantage. Preferred Certifications CGEIT or CISM CISSP ISO 27001 Demonstrated experience in conducting Risk Assessments for Vendors, Internal and External stakeholders. Experience in Information Security or demonstrated knowledge on Information Security Operations. Demonstrated experience in a multi-vendor environment. Demonstrated experience in Cloud Security assessments on various Cloud platforms such as AWS, Azure, Oracle etc. WORK SCHEDULE OR TRAVEL REQUIREMENTS 2 PM to 11 PM
Posted 2 weeks ago
3.0 - 7.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Job Description: Value Preposition Efficiently identifies and investigates sophisticated threats, ensuring faster incident containment. Shape the Future of Security: Contribute to the continuous improvement of our security processes and mentor the next generation of SOC analysts. Job Details Position Title: Information Security Engineer I Career Level: P1 Job Category: Associate Role Type: Hybrid Job Location: Bangalore About the Team: The Security Operations Center (SOC) team is a community of dedicated professionals committed to safeguarding our organizations information security. Our values inclusivity, transparency, and excellence drive everything we do. Join us and make a meaningful impact on our security posture Impact (Job Summary/Why this Role Matters) The Security Operations Center (SOC) team is a community of dedicated professionals committed to safeguarding our organizations information security. Our values inclusivity, transparency, and excellence drive everything we do. Join us and make a meaningful impact on our security posture Key Deliverables (Duties and Responsibilities) 24/7 Rotational Shifts: Ensure round-the-clock security coverage by working on a rotational schedule. Perform triage and analysis of alerts to determine the severity and impact. Must have worked on incidents related to Phishing, EDR, Antivirus, , IDS/IPS, DNS, Email & AD etc. Follow standard operating procedures for incident handling and reporting. Document finding and escalate incidents to L2/Le analysts when required. Collect, analyze, and disseminate threat intelligence to relevant stakeholders. Support continuous improvement of SOC process and detection capabilities. Identify any technology gaps and contribute to designing solutions to address them. Support the automation effort to streamline and accelerate triage response. Monitor, analyze, prioritize Cyber Security events, initiate response, and remediation actions. Ensure to meet the SLA for all the tickets. Ensure defined process and procedures are followed. Act as a team player supporting peers, and department management. Skills and Qualification (Functional and Technical Skills) Functional Skills: Bachelor s degree in computer science, IT, Cyber Security, or related field. 2 years experience in cyber security. SOC Experience preferred. Good verbal, written, and interpersonal communication skills. An ability to quickly gain a thorough knowledge of operations and products. Team Player: Support peers and department management Excellent attention to detail and ability to identify and analyze complex patterns. Technical/Business Skills: Deep understanding of attack vectors, tactics, techniques, and procedures (TTPs) Familiarity with security tools such as SIEM, Antivirus, EDR, Email gateway etc. Security certifications such as CompTIA Security+, CEH or similar. Experience with platforms like Splunk, IBM QRadar or Microsoft Sentinel Familiarity with incident response frameworks - NIST, MITRE ATT&CK Relationships & Collaboration Reports to: Sr. Manager SOC Partners: SOC Analysts Accessibility Needs We are committed to providing an inclusive and accessible hiring process. If you require accommodations at any stage (e.g. application, interviews, onboarding) please let us know, and we will work with you to ensure a seamless experience
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
17062 Jobs | Dublin
Wipro
9393 Jobs | Bengaluru
EY
7759 Jobs | London
Amazon
6056 Jobs | Seattle,WA
Accenture in India
6037 Jobs | Dublin 2
Uplers
5971 Jobs | Ahmedabad
Oracle
5764 Jobs | Redwood City
IBM
5714 Jobs | Armonk
Tata Consultancy Services
3524 Jobs | Thane
Capgemini
3518 Jobs | Paris,France