Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 8.0 years
7 - 10 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver / No. / Performance Parameter / Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT Mandatory Skills: Saviynt. Experience: 5-8 Years.
Posted 3 weeks ago
3.0 - 5.0 years
5 - 8 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver / No. / Performance Parameter / Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience: 3-5 Years.
Posted 3 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver / No. / Performance Parameter / Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Hashicorp Vault. Experience: 5-8 Years.
Posted 3 weeks ago
5.0 - 8.0 years
7 - 11 Lacs
Chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver / No. / Performance Parameter / Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT Mandatory Skills: Checkpoint Firewalls and VPN. Experience: 5-8 Years.
Posted 3 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Noida
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver / No. / Performance Parameter / Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience: 5-8 Years.
Posted 3 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver / No. / Performance Parameter / Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: SailPoint Identity Mgmt and Governance. Experience: 5-8 Years.
Posted 3 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Security Compliance and Framework.
Posted 3 weeks ago
8.0 - 13.0 years
15 - 30 Lacs
Hyderabad, Chennai, Bengaluru
Work from Office
We are currently seeking candidates for Gigamon Platform Administration roles located in Chennai, Hyderabad, and Bangalore. The ideal candidates should have 8 to 12 years of relevant experience. Gigamon Platform Administration Location: Chennai, Hyderabad, and Bangalore Required years of experience: 8 to 12 years Administer, configure, and maintain the Gigamon platform to ensure optimal performance. Monitor system performance, network traffic, and system health to identify potential issues and resolve them proactively. Perform daily, weekly, and monthly checks on system health, logs, and alerts to ensure the platform operates smoothly. Configure traffic monitoring policies, filters, and monitoring rules within the Gigamon platform. Implement network visibility solutions for different teams such as Security Operations, IT, and Network Operations. Fine-tune the system and optimize resource allocation to ensure high availability and scalability Respond to incidents related to the Gigamon platform and troubleshoot any issues that arise, such as network visibility problems or configuration errors. Work with network and security teams to address complex technical issues, providing solutions for system performance bottlenecks and service interruptions Install patches, software, and firmware updates to maintain the systems functionality, security, and compatibility. Test and validate platform upgrades, ensuring there are no disruptions to network services Provide periodic status reports to stakeholders on the health and performance of the Gigamon platform Work closely with cross-functional teams (e.g., Security, Networking, and IT Operations) to ensure the platform meets organizational needs and security standards
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Noida
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT Mandatory Skills: PingFederate.
Posted 3 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver / No. / Performance Parameter / Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA's (90-95%), response time and resolution time TAT Mandatory Skills: Microsoft Entra ID. Experience: 5-8 Years.
Posted 3 weeks ago
6.0 - 10.0 years
13 - 15 Lacs
Bengaluru
Work from Office
Seeking experienced Ops Manager to lead Network Operations Center &Security Operations Center team. This will focus on developing & implementing ops strategies that align with business objectives, enhancing service reliability &optimizing resources
Posted 3 weeks ago
3.0 - 5.0 years
3 - 5 Lacs
Surat
Work from Office
Role & responsibilities Lead the security team, including physical security, cybersecurity, and compliance personnel Oversee physical security systems for all industrial facilities including surveillance, access control, and perimeter security. Coordinate with site managers and operations teams to mitigate threats and respond to incidents. Ensure compliance with local, national, and international regulations (e.g., OSHA, GDPR, CTPAT). Develop security protocols for emergency situations (e.g., fire, breach, workplace violence) Implement company-wide security training programs for employees and contractors. Foster a culture of security awareness and responsibility. Lead the crisis management team during emergencies. Develop and regularly update business continuity and disaster recovery plans. Preferred candidate profile 10+ years of experience in corporate or industrial security, including 5+ in a senior leadership role. Experience in both physical security and cybersecurity domains. Professional certifications such as CPP (ASIS), CISSP, CISM, or CISA are highly desirable. Strong leadership, communication, and crisis management skills. Familiarity with industry-specific regulations and best practices. May require travel between multiple sites and occasional on-call availability for security incidents. Exposure to industrial environments, which may include noise, hazardous materials, or 24/7 operations. Reediness with 3 years of mutual agreement for stability purpose.
Posted 3 weeks ago
6.0 - 11.0 years
14 - 18 Lacs
Bengaluru
Work from Office
locationsBangalore, Indiaposted onPosted 2 Days Ago job requisition id29822 FICO (NYSEFICO) is a leading global analytics software company, helping businesses in 100+ countries make better decisions. Join our world-class team today and fulfill your career potential! The Opportunity Join our Cyber Security Engineering team where youll play a critical role in managing and securing our infrastructure. In this hands-on position, you'll work on IAM, database security, and cloud environments, ensuring our systems remain secure and compliant. This role provides the opportunity to collaborate with experts across multiple domains, helping you build a deep understanding of security architectures in hybrid environments. Director, Cyber Security. What Youll Contribute Manage, maintain, and optimize security and audit infrastructure, including application and database servers. Oversee security, reporting, and auditing of Active Directory (AD) and Entra ID to ensure proper access controls and identity management. Administer AWS Key Management Services (KMS) for encryption key lifecycle management to protect critical data within AWS environments. Implement and manage database security controls, audits, and encryption to safeguard sensitive data. Support security operations by responding to incidents, investigating threats, and remediating risks. Collaborate on security audits, compliance initiatives, and risk assessments to meet regulatory standards. Maintain thorough documentation of security configurations, incidents, and remediation actions, and provide regular reports on security metrics. What Were Seeking Bachelor's degree in Computer Science, Cyber Security, Information Technology, or a related field. Relevant security certifications like CEH or AWS Certified Security are a plus. 6+ years of experience in a Cyber Security Engineering role. Working knowledge of networks, protocols, Linux/Windows OS internals, and system configuration. Hands-on experience with Active Directory/Entra ID auditing and reporting. Knowledge of AWS Key Management Services (KMS), CloudWatch, CloudTrail, and Guard Duty. Experience with AWS CLI and Infrastructure as Code (Terraform is a plus) Knowledge of database security best practices, encryption technologies, and cryptographic key management. Our Offer to You An inclusive culture strongly reflecting our core valuesAct Like an Owner, Delight Our Customers and Earn the Respect of Others. The opportunity to make an impact and develop professionally by leveraging your unique strengths and participating in valuable learning experiences. Highly competitive compensation, benefits and rewards programs that encourage you to bring your best every day and be recognized for doing so. An engaging, people-first work environment offering work/life balance, employee resource groups, and social events to promote interaction and camaraderie. Why Make a Move to FICO At FICO, you can develop your career with a leading organization in one of the fastest-growing fields in technology today Big Data analytics. Youll play a part in our commitment to help businesses use data to improve every choice they make, using advances in artificial intelligence, machine learning, optimization, and much more. FICO makes a real difference in the way businesses operate worldwide Credit Scoring FICO Scores are used by 90 of the top 100 US lenders. Fraud Detection and Security 4 billion payment cards globally are protected by FICO fraud systems. Lending 3/4 of US mortgages are approved using the FICO Score. Global trends toward digital transformation have created tremendous demand for FICOs solutions, placing us among the worlds top 100 software companies by revenue. We help many of the worlds largest banks, insurers, retailers, telecommunications providers and other firms reach a new level of success. Our success is dependent on really talented people just like you who thrive on the collaboration and innovation thats nurtured by a diverse and inclusive environment. Well provide the support you need, while ensuring you have the freedom to develop your skills and grow your career. Join FICO and help change the way business thinks! Learn more about how you can fulfil your potential at FICO promotes a culture of inclusion and seeks to attract a diverse set of candidates for each job opportunity. We are an equal employment opportunity employer and were proud to offer employment and advancement opportunities to all candidates without regard to race, color, ancestry, religion, sex, national origin, pregnancy, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. Research has shown that women and candidates from underrepresented communities may not apply for an opportunity if they dont meet all stated qualifications. While our qualifications are clearly related to role success, each candidates profile is unique and strengths in certain skill and/or experience areas can be equally effective. If you believe you have many, but not necessarily all, of the stated qualifications we encourage you to apply. Information submitted with your application is subject to theFICO Privacy policy at
Posted 3 weeks ago
10.0 - 17.0 years
20 - 27 Lacs
Chennai
Work from Office
We are looking for Manager, Physical Security for Chennai office, please refer the details below: Exp. Range-10-16 Years Location-Chennai Job Description: What does a successful Manager, Security do at Fiserv? Reporting to the Senior Vice President of Global Security, APAC, the North India and Pune Manager Security position will provide oversight , assistance and response for all security needs across India. This includes asset and content protection, investigative support, travel security, workplace security, security technology, and incident monitoring. In an emergency, the Security Manager can respond, oversee and direct Fiserv assistance and support by providing operational capabilities, technical expertise, and policy recommendations in the performance of essential services along with Fiserv Global Security internal partners, business partners, third-party security vendors, law enforcement, etc. What will you do Provide risk assessment, plan development, vendor management, and security support for all Fiserv operations. Provide immediate stabilization and management for security incidents. Integrate existing intelligence efforts to assess global security and geopolitical events to keep all business operations and safe, secure and resilient. Develop and implement comprehensive security plans for company operations by effectively utilizing Global Security resources and successfully collaborating with key company stakeholders, external sources and law enforcement. Engage with relevant local stakeholders including regional leadership. Develop/review risk assessments and security guidelines and design security plans and specialized guidance for higher-risk activities. Maintain collaborative relationships with internal Global Security partners and external law enforcement partners. Conduct and oversee security assessment program and leverage external and internal partners for timely threat and risk evaluations and response. Ensure that safety and asset protections plans are communicated and delivered. Build and partner with the security industry to identifying technology solutions to support security requirements. Support the Global/regional crisis management program in India which supports the Fiserv in its response to a variety of emergencies and provides resources to help prepare for any kind of disaster. This includes medical emergency support, First Aid and CPR/AED trainings, disaster response, Communal incident preparedness, etc. Escalates notification to leadership and maintains consistent communication on investigation results and remediation. Manages security vendors, service providers, etc. Supports security and operations for Fiserv Work, Health, Safety and Risk Management Complete or oversee audit reports, reviews and evaluations and report back to the business. What you will need to have 10+ years experience in private sector corporate security or a related public sector organization/law enforcement Bachelor’s degree in an area of study relevant to this position Nice to have- Strong working knowledge of the Fintech services industry. Strategic thinker with the ability to drive execution against a financial plan. Strong interpersonal skills and ability to influence a diverse audience including experience working with external partners and business owners to bring product and assortments to the market. Successful experience working, and thriving, in a highly matrixed company structure. Strong organizational skills with the ability to work on multiple projects in an efficient manner to meet dynamic deadlines. Quick learner with ability to take direction, work under pressure, and operate as part of a team Excellent verbal and written communication skills. Experience managing multiple stakeholders. Strong Team Player – ability to build & foster collaborative partnerships across functions & departments. Well-developed communication skills Ability to manage the organizational and cultural change efforts needed to ensure new, innovative concepts, business practices, and technologies are fully adopted and integrated into the business. Ability to travel domestically and internationally as required. What would be great to have: Graduate/Master’s degree Professional certifications in security Experience in the security industry/law enforcement/services
Posted 3 weeks ago
1.0 - 9.0 years
3 - 7 Lacs
Hyderabad
Work from Office
Career Category Information Systems Job Description Join Amgen s Mission of Serving Patients At Amgen, if you feel like you re part of something bigger, it s because you are. Our shared mission to serve patients living with serious illnesses drives all that we do. Since 1980, we ve helped pioneer the world of biotech in our fight against the world s toughest diseases. With our focus on four therapeutic areas -Oncology, Inflammation, General Medicine, and Rare Disease- we reach millions of patients each year. As a member of the Amgen team, you ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. Information Security Engineer - Vulnerability Management Analyst What you will do Let s do this. Let s change the world. In this vital role is focused on identifying, assessing, prioritizing, and tracking the remediation of vulnerabilities across the organization s technology stack. The Vulnerability Management Analyst plays a key role in the security operations team by ensuring known vulnerabilities are managed through their lifecycle using structured processes and tools. The individual will analyze vulnerability scan data, correlate threat intelligence (e. g. , KEV, EPSS), and work closely with infrastructure, application, and business teams to drive risk-based remediation. Roles & Responsibilities: Analyze vulnerability scan results from tools like Tenable, Qualys, or Rapid7 to identify security weaknesses across infrastructure and applications. Prioritize vulnerabilities using multiple criteria, including CVSS, KEV (Known Exploited Vulnerabilities), EPSS (Exploit Prediction Scoring System), asset criticality, and business context. Partner with IT and DevOps teams to track remediation progress and provide technical guidance on mitigation strategies. Monitor threat intelligence feeds to correlate vulnerabilities with current exploit activity. Create and maintain vulnerability metrics, dashboards, and reports for leadership and compliance teams. Support vulnerability assessment activities in cloud environments (AWS, Azure, etc. ). Maintain documentation related to the vulnerability management lifecycle. Assist in policy and process development related to vulnerability and patch management. Participate in audits and compliance efforts (e. g. , SOX, ISO, NIST, PCI). What we expect of you We are all different, yet we all use our unique contributions to serve patients. Master s degree and 1 to 3 years of experience in Cybersecurity, vulnerability management or information security operations OR Bachelor s degree and 3 to 5 years of experience in Cybersecurity, vulnerability management or information security operations OR Diploma and 7 to 9 years of experience in Cybersecurity, vulnerability management or information security operations Must-Have Skills: Familiarity with vulnerability management tools (e. g. , Tenable, Qualys, Rapid7). Understanding of CVSS scoring, vulnerability lifecycle, and remediation workflows. Basic knowledge of threat intelligence and how it applies to vulnerability prioritization. Working knowledge of network, operating system, and application-level security. Ability to analyze scan data and correlate it with business context and threat intelligence. Preferred Qualifications: Good-to-Have Skills: Experience with KEV, EPSS, and other threat-based scoring systems. Familiarity with patch management processes and tools. Exposure to cloud security and related scanning tools (e. g. , Prisma Cloud, AWS Inspector). CompTIA Security+ GIAC GSEC / GCIH Qualys Vulnerability Management Specialist (QVMS) Tenable Certified Nessus Auditor (TCNA) Soft Skills: Analytical Thinking - Ability to interpret complex data sets and assess risk effectively Attention to Detail - Precision in identifying and tracking vulnerabilities and remediation status Communication Skills - Ability to communicate technical findings to both technical and non-technical audiences Collaboration & Teamwork - Able to work across IT, DevOps, and security teams to drive resolution Curiosity & Continuous Learning - Willingness to know the latest with evolving threats and technologies Problem-Solving Approach - Capability to identify solutions to security weaknesses in diverse environments What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now and make a lasting impact with the Amgen team. careers. amgen. com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. .
Posted 3 weeks ago
1.0 - 9.0 years
5 - 9 Lacs
Hyderabad
Work from Office
Career Category Information Systems Job Description Join Amgen s Mission of Serving Patients At Amgen, if you feel like you re part of something bigger, it s because you are. Our shared mission to serve patients living with serious illnesses drives all that we do. Since 1980, we ve helped pioneer the world of biotech in our fight against the world s toughest diseases. With our focus on four therapeutic areas -Oncology, Inflammation, General Medicine, and Rare Disease- we reach millions of patients each year. As a member of the Amgen team, you ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. What you will do Role Description: Let s do this. Let s change the world. In this vital role you will collaborate closely with cybersecurity departments to identify and define automation requirements that streamline security processes and incident responses. The engineer will create and refine automation playbooks using low-code platforms, integrate new and existing security tools, and develop custom APIs to ensure seamless inter-connectivity among systems. Additionally, the engineer will engage in the selection and tuning of machine learning algorithms tailored to address specific security challenges faced by the organization. A key component of the role is to maintain up-to-date technical documentation and user guides to support the ongoing use and understanding of automated systems. The Security Automation Engineer must also keep abreast of the latest cybersecurity trends and technologies, sharing insights and standard processes with the team to continually enhance the organization s security posture. Roles & Responsibilities: Create playbooks using a low-code platform to streamline security operations Integrate new and existing security tools and platforms; Design, code, and integrate custom APIs. Create technical documentation and user guides. Continuously monitor and maintain the automation platform and ensure that all systems and applications are up to date with the latest security patches and updates. Ensure compliance with relevant regulations (e. g. , GDPR, HIPAA) and industry standards (e. g. , ISO 27001, NIST). Keep up to date with the latest security threats, trends, and technologies, and provide recommendations for improving security operations. Triage issues found by tools, external reports, and various tests, to accurately assess the real risks. Offer remediation guidance to partners for identified issues and serve as a customer concern resource for developers as they reduce issues. What we expect of you We are all different, yet we all use our unique contributions to serve patients. Basic Qualifications: Master s degree and 1 to 3 years of directly related experience OR Bachelor s degree and 3 to 5 years of directly related experience OR Diploma and 7 to 9 years of directly related experience. Must-Have Skills: Proficiency in Python scripting and automation Experience with REST API technology Experience with Linux is a MUST Experience with Security Orchestration Automation and Response (SOAR) tools (e. g. Swimlane, Cortex XSOAR, etc. ) Experience with development of automation playbooks and integrating multiple security tools to enhance efficiency and effectiveness Preferred Qualifications: Knowledge of cybersecurity frameworks, technologies, and standard methodologies Experience in risk management, incident response, and security governance Knowledge of security architecture frameworks and principles Professional Certifications: CEH (preferred) CompTIA Security+ (preferred) RHCSA (preferred) CISSP (preferred) Soft Skills: Excellent analytical and troubleshooting skills Strong verbal and written communication skills Ability to work effectively with global, virtual teams High degree of initiative and self-motivation Ability to manage multiple priorities successfully Team oriented, with a focus on achieving team goals Strong presentation and public speaking skills What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Equal opportunity statement Amgen is an Equal Opportunity employer and will consider you without regard to your race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, or disability status. We will ensure that individuals with disabilities are provided with reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request an accommodation. Apply now and make a lasting impact with the Amgen team. careers. amgen. com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. .
Posted 3 weeks ago
1.0 - 9.0 years
5 - 8 Lacs
Hyderabad
Work from Office
Career Category Information Systems Job Description Join Amgen s Mission of Serving Patients At Amgen, if you feel like you re part of something bigger, it s because you are. Our shared mission to serve patients living with serious illnesses drives all that we do. Since 1980, we ve helped pioneer the world of biotech in our fight against the world s toughest diseases. With our focus on four therapeutic areas -Oncology, Inflammation, General Medicine, and Rare Disease- we reach millions of patients each year. As a member of the Amgen team, you ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. Information Security Engineer - Vulnerability Management Analyst What you will do Let s do this. Let s change the world. In this vital role is focused on identifying, assessing, prioritizing, and tracking the remediation of vulnerabilities across the organization s technology stack. The Vulnerability Management Analyst plays a key role in the security operations team by ensuring known vulnerabilities are managed through their lifecycle using structured processes and tools. The individual will analyze vulnerability scan data, correlate threat intelligence (e. g. , KEV, EPSS), and work closely with infrastructure, application, and business teams to drive risk-based remediation. Roles & Responsibilities: Analyze vulnerability scan results from tools like Tenable, Qualys, or Rapid7 to identify security weaknesses across infrastructure and applications. Prioritize vulnerabilities using multiple criteria, including CVSS, KEV (Known Exploited Vulnerabilities), EPSS (Exploit Prediction Scoring System), asset criticality, and business context. Partner with IT and DevOps teams to track remediation progress and provide technical guidance on mitigation strategies. Monitor threat intelligence feeds to correlate vulnerabilities with current exploit activity. Create and maintain vulnerability metrics, dashboards, and reports for leadership and compliance teams. Support vulnerability assessment activities in cloud environments (AWS, Azure, etc. ). Maintain documentation related to the vulnerability management lifecycle. Assist in policy and process development related to vulnerability and patch management. Participate in audits and compliance efforts (e. g. , SOX, ISO, NIST, PCI). What we expect of you We are all different, yet we all use our unique contributions to serve patients. Master s degree and 1 to 3 years of experience in Cybersecurity, vulnerability management or information security operations OR Bachelor s degree and 3 to 5 years of experience in Cybersecurity, vulnerability management or information security operations OR Diploma and 7 to 9 years of experience in Cybersecurity, vulnerability management or information security operations Must-Have Skills: Familiarity with vulnerability management tools (e. g. , Tenable, Qualys, Rapid7). Understanding of CVSS scoring, vulnerability lifecycle, and remediation workflows. Basic knowledge of threat intelligence and how it applies to vulnerability prioritization. Working knowledge of network, operating system, and application-level security. Ability to analyze scan data and correlate it with business context and threat intelligence. Preferred Qualifications: Good-to-Have Skills: Experience with KEV, EPSS, and other threat-based scoring systems. Familiarity with patch management processes and tools. Exposure to cloud security and related scanning tools (e. g. , Prisma Cloud, AWS Inspector). CompTIA Security+ GIAC GSEC / GCIH Qualys Vulnerability Management Specialist (QVMS) Tenable Certified Nessus Auditor (TCNA) Soft Skills: Analytical Thinking - Ability to interpret complex data sets and assess risk effectively Attention to Detail - Precision in identifying and tracking vulnerabilities and remediation status Communication Skills - Ability to communicate technical findings to both technical and non-technical audiences Collaboration & Teamwork - Able to work across IT, DevOps, and security teams to drive resolution Curiosity & Continuous Learning - Willingness to know the latest with evolving threats and technologies Problem-Solving Approach - Capability to identify solutions to security weaknesses in diverse environments What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now and make a lasting impact with the Amgen team. careers. amgen. com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. .
Posted 3 weeks ago
2.0 - 5.0 years
10 - 12 Lacs
Gurugram
Work from Office
Responsibilities: * Ensure compliance with regulatory standards * Oversee security operations & management * Manage crisis situations effectively * Collaborate with stakeholders on risk mitigation strategies
Posted 3 weeks ago
2.0 - 5.0 years
4 - 5 Lacs
Kochi
Work from Office
Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Main Responsibilities Tier 2 SOC analysts are incident responders, remediating serious attacks escalated from Tier 1, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments (CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone), based on the security event severity and suspicious activities, escalate to managed service support teams, tier 3 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when new threats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Other responsibilities and additional duties as assigned by the security management team or service delivery manager Requirements: Min 3 Years Experience as SOC Analyst (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows. Excellent written and verbal communication skills Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting
Posted 3 weeks ago
2.0 - 4.0 years
4 - 5 Lacs
Bhopal, Dewas, Gudur
Work from Office
Job Title: Security Officer Industry: Dairy / Food Processing Job Purpose: To ensure the safety and security of the dairy plant, personnel, assets, and operations by implementing and monitoring security procedures, preventing unauthorized access, and responding to emergencies in a timely and effective manner. Key Responsibilities: Monitor and control access to the plant premises for employees, visitors, and vehicles. Conduct regular patrols of the plant, warehouses, cold storage units, and perimeters. Supervise and inspect security systems including CCTV, alarms, gates, and lighting. Maintain detailed records of incidents, visitors, deliveries, and patrols. Check vehicles transporting milk, dairy products, and raw materials for proper documentation and security compliance. Ensure security during loading and unloading of dairy products to prevent pilferage or contamination. Report and respond promptly to security breaches, fire, theft, vandalism, or other emergencies. Enforce company policies and procedures related to safety and hygiene. Collaborate with production, logistics, and quality control teams to ensure secure and safe operations. Conduct security drills and participate in safety audits and inspections. Assist in training staff on security protocols and emergency response. Documentation External Co-ordination, Police licensing, uneven circumstance controlling. Arranging for Driver for Company vehicle. Requirements: Prior experience in industrial or plant security, preferably in the food or dairy industry. Knowledge of security systems and emergency procedures. Strong observational and problem-solving skills. Physical fitness and willingness to work in shifts, including nights and weekends. Ability to work independently and maintain a high level of integrity and discretion. Security guard, must always be mindful of the surroundings to protect the property. This duty could include involve patting down people who are entering the building. The guard must stay vigilant, utilizing their keen sense of sight, hearing & smell.
Posted 3 weeks ago
4.0 - 9.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Job Profile Description (JD) - Vigilance /Security Location-Kharkoda Qualification Minimum Graduate Experience: Ex-Defence (Army/Navy/Air Force) or Para-Military forces (BSF/ CRPF/ITBP) with minimum 15-20 experience in Security/Vigilance. Minimum compulsory 4 years experience in Manufacturing Industry with Union environment post forces tenure. Preferably from Haryana. Age- Up to 45 years only Role: Perform the role and responsibilities of Shift In charge - Security/ Vigilance. Skills Competencies-: 1. Shift Security Operations Monitoring and control of shift operations of Security. Deployment, control and monitoring of Security deployment in shift. Strengthening streamlining of security procedures. Ensure adherence/implementation of SOPs for move of men and material. Ensuring briefing / de-briefing for shift duties. Coordinate all the activities in case of any kind of emergency, i.e., fire / natural calamities / other contingencies. Visitor management. Training and development of guards maintaining discipline on continuous basis as per need of the organization. Should understand operations of CCTV, Access Control, Flap Barriers and other security equipment 2. Access Control / Men Material Management Regulating movement of men/material during shifts through proper documentation/ gate passes. Preventing any kind of unauthorized entry into the premises. Handling of unwanted elements around the premises, diffusing the situation as and when required. Traffic / parking management. Undertake surprise checks during shifts. 3. Loss Prevention/ Theft Control / Investigations Implementation of security measures to avoid / minimize theft / pilferage incidents. Proper monitoring of material movement including scrap. Proper regulation of RGP/ NRGP. Damage control. Investigation in various misconduct / theft related issues. 4. Liaison Intelligence gathering in IR environment To liaise strengthen/maintain cordial relations with Police authorities and surrounding villagers To develop network to obtain inside/beforehand information concerning both internal and external factors. Development of Intelligence network among other industries. 5. MIS Audit Conducting security audit on a regular basis in order to identify and close gaps in the existing security system. Select, design, implement and manage security measure to reduce risk of loss through continual use of auditing, review assessment. Preparation submission of various reports and MIS. 6. General Administrative Work Monitoring creating discipline workforce including Contractual labour etc. Impose financial penalty for various acts of indiscipline as per laid down SOP. Scrutinization processing of vendor bills. Should be well versed with Statutory compliances including PSARA Act etc. 7. Computer Skills Good knowledge of Computers (E-mail, Excel, Word, Presentations). Excellent knowledge of CCTV surveillance system. 8. Linguistic Skills Written and verbal proficiency in Hindi and English
Posted 3 weeks ago
7.0 - 9.0 years
7 - 11 Lacs
Thiruvananthapuram
Work from Office
Job Title: Specialist I - Information Security | Vulnerability Management - Subject Matter Expert (SME) Location:, Hyderabad , Chennai , Bangalore , Trivandrum , Cochin Experience: 7-9 years Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. Job Summary: We are seeking a highly experienced and knowledgeable Subject Matter Expert (SME) to join our Vulnerability Management team. The ideal candidate will possess deep expertise in cybersecurity, particularly in vulnerability management processes, tools, and best practices. This role demands strong analytical skills, excellent communication, and a proactive approach to security risk mitigation. Key Responsibilities: Lead and manage the vulnerability management program end-to-end. Conduct vulnerability assessments and penetration testing. Use tools like Qualys VMDR, MS Defender, and CrowdStrike to detect, analyze, and report vulnerabilities. Create dashboards and detailed reports with actionable recommendations. Prioritize vulnerabilities based on business risk and exploitability. Collaborate with technical teams for remediation planning and execution. Stay current with emerging threats, trends, and technologies. Deliver training on vulnerability management processes and tools. Support incident response efforts with expertise in vulnerability exploitation and mitigation. Ensure compliance with security frameworks and regulatory standards.
Posted 3 weeks ago
10.0 - 15.0 years
9 - 13 Lacs
Bengaluru
Work from Office
THE ROLE: As Events Security Specialist the incumbent will support all the Regional and National Events organized in India for Planning, site recce, coordination with regional sales teams and National Events team and support in security planning, route planning, crowd management, incident management, executive protection planning (wherever applicable) for events and be present on ground for assisting in overall safe and secure execution and incident management at the events. This position will have numerous interfaces with sub-regional sales teams, national events team, security vendors, GSS, venue teams, AS teams and others for ensuring proper planning for all the events is done professionally and executed on ground seamlessly to ensure safety of staff and distributors attending the events. HOW YOU WOULD CONTRIBUTE: Assist with planning, coordinating, and supervising complex, medium to large scale event security operations for Regional and National teams based upon needs of an event. Travel domestically in support of security operations for events - approximately 40%. Develop and maintain positive relationships with domestic law enforcement, private sector peers, and internal/external stakeholders in support of event security needs. Ability to work flexible schedules to include extended days, evenings, weekends, and travel domestically and internationally, as necessary. To support end to end security and safety planning for events and act as on ground Incident Controller wherever such presence is required. To conduct briefings the sub-regional sales teams, security vendors venue security on events security procedures, needs and event specific incident management plans. All other duties, as assigned WHAT S SPECIAL ABOUT THE TEAM: Global Security Safetys mission is to ensure a safe and secure work environment by creating and implementing processes, procedures and technologies that protect Herbalife Nutrition employees, shareholders, and assets against internal and external threats. We are also a resource for employees to provide you with information on a wide variety of subjects ranging from traveler advisories to workplace violence prevention, to employee safety in the office environment. Global Security and Safety is driven to provide globally consistent services, which are locally relevant and enable our business. We succeed with a professional team of experts who work as one to provide a best-in-class security and safety program. The department is built around core-competencies, General Safety, Business Continuity, Event Security, Employee Protection, Physical Security, and Security Operations Center. SUPERVISORY RESPONSIBILITIES: Vendor management Individual should be able to manage multiple service providers and act as needed per SOP SOW. Scalability - Ability to scale up, efficiently coordinate work with team members and cross-functional teams. Financial/ Analytics should be capable of handling and understanding Capex/Opex costing. Strategic Should be able to analyze the cost differences and take a decision as per company policy, with relevant subject matter expertise. Prepare and maintain the standards for Event Planning, Incident Management at events. Compliance Audit ensure compliance requirements are adhered as per the standards. SKILLS AND BACKGROUND REQUIRED TO BE SUCCESSFUL: Skills Experience of end-to-end events planning for mega events. Experience analyzing intelligence and global threat reports to understand risk levels and potential impact to a location, event or person so that appropriate resources can be sourced and deployed. Ability to adapt and improvise in view of fast changing information regarding events. Ability to anticipate the challenges and plan for mitigation measures for events. Strong communication and customer service skills with the ability to complete multiple tasks in a fast-paced and quickly changing environment. Experience managing security for medium to large global events and conducting physical security assessments. Highly organized with exceptional attention to detail. Experience: Minimum of 10 years of experience in Event Security Safety Planning and execution for mega events in India. Relevant experience in preparing and briefing security incident management plans for events to relevant stakeholders- Internal as well as External. Proficiency in Microsoft Office (Excel, Word, PowerPoint) and email tools (MS Outlook). Education: Bachelors degree in a related field is preferred. NCC C Certificate is an added advantage. Specialized training in Event Planning and Security Management will be an added advantage and is highly desired. Qualifications Please review EMEAI Description box
Posted 3 weeks ago
15.0 - 20.0 years
11 - 15 Lacs
Bengaluru
Work from Office
At Arctic Wolf, were redefining the cybersecurity landscape. With our employee Pack members, spread out globally, committed to setting new industry standards. Our accomplishments speak for themselves, from our recognition in the Forbes Cloud 100 , CNBC Disruptor 50 , Fortune Future 50 , and Fortune Cyber 60 to winning the 2024 CRN Products of the Year award. We re proud to be named a Leader in the IDC MarketScape for Worldwide Managed Detection and Response Services and earning a Customers Choice distinction from Gartner Peer Insights . Our Aurora Platform also received CRN s Products of the Year award in the inaugural Security Operations Platform category. Join a company that s not only leading, but also shaping, the future of security operations. About the Role The Arctic Wolf security operations platform ingests and processes upwards of 250 billion events a day from a wide variety of on-premise devices and cloud platforms. The security pipeline is a distributed system of loosely-coupled micro-services that constitute our real-time analysis and threat detection systems. These services distill the incoming events into actionable intelligence that our Concierge Security Teams use to protect customers. We are growing rapidly, with our data volume increasing ten-fold roughly every two years. We are looking for a Principal Developer to join our pack and evolve the capabilities of our security platform. Responsibilities Create and scale high-performance services in a real-time threat analysis pipeline Architect, design, develop, test and deliver software in an agile environment Provide technical and professional leadership for your team Identify, collaborate and influence multiple teams or organizations to achieve outcomes Proactively identity issues that could become future concerns and plan resolution Routinely present to the Executive Team Our Technology Stack: Golang, Python, Java, Docker, Amazon Web Services (AWS), Kubernetes or ECS, Linux, React/Typescript About You: 15+ years of hands-on experience. Excited to work at the intersection of Big Data and the Cybersecurity problem spaces Expert in building high performance, scalable and highly available systems Love coding Expert level knowledge of services on cloud computing platforms (e.g, AWS, Azure, GCP) Expert on distributed systems and microservices (edited) About the Company At Arctic Wolf, we foster a collaborative and inclusive work environment that thrives on diversity of thought, background, and culture. This is reflected in our multiple awards, including Top Workplace USA (2021-2024), Best Places to Work - USA (2021-2024), Great Place to Work - Canada (2021-2024), Great Place to Work - UK (2024), and Kununu Top Company - Germany (2024). Our commitment to bold growth and shaping the future of security operations is matched by our dedication to customer satisfaction, with over 7,000 customers worldwide and more than 2,000 channel partners globally. As we continue to expand globally and enhance our technology, Arctic Wolf remains the most trusted name in the industry. Our Values Arctic Wolf recognizes that success comes from delighting our customers, so we work together to ensure that happens every day. We believe in diversity and inclusion, and truly value the unique qualities and unique perspectives all employees bring to the organization. And we appreciate that by protecting people s and organizations sensitive data and seeking to end cyber risk we get to work in an industry that is fundamental to the greater good. We celebrate unique perspectives by creating a platform for all voices to be heard through our Pack Unity program. We encourage all employees to join or create a new alliance. See more about our Pack Unity here . We also believe and practice corporate responsibility, and have recently joined the Pledge 1% Movement, ensuring that we continue to give back to our community. We know that through our mission to End Cyber Risk we will continue to engage and give back to our communities. All wolves receive compelling compensation and benefits packages, including: Equity for all employees Flexible annual leave, paid holidays and volunteer days Training and career development programs Comprehensive private benefits plan including medical insurance for you and your family, life insurance (3x compensation), and personal accident insurance. Fertility support and paid parental leave Arctic Wolf is an Equal Opportunity Employer and considers applicants for employment without regard to race, color, religion, sex, orientation, national origin, age, disability, genetics, or any other basis forbidden under federal, provincial, or local law. Arctic Wolf is committed to fostering a welcoming, accessible, respectful, and inclusive environment ensuring equal access and participation for people with disabilities. As such, we strive to make our entire employee experience as accessible as possible and provide accommodations as required for candidates and employees with disabilities and/or other specific needs where possible. for this position.
Posted 3 weeks ago
5.0 - 10.0 years
10 - 18 Lacs
Bengaluru
Work from Office
Job Description: We are seeking a dedicated Vehicle SOC Analyst to join our automotive cybersecurity operations team. This role focuses on monitoring and responding to threats targeting in-vehicle systems , connected car platforms, and vehicle-to-everything (V2X) technologies. The analyst will work with in-vehicle security tools and contribute to the development of automotive-specific detection and response strategies. Key Responsibilities: Automotive Security Monitoring & Analysis: Monitor vehicle telemetry, network traffic, and logs from ECUs, gateways, and telematics units. Identify, investigate, and respond to cyber threats affecting in-vehicle networks (CAN, LIN, FlexRay, Ethernet). Perform root cause analysis of security alerts and anomalous vehicle behavior. In-Vehicle Security Protocols & Standards: Ensure implementation of in-vehicle cybersecurity protocols such as secure boot, secure OTA, authentication, and encryption. Maintain awareness of ISO/SAE 21434, UNECE WP.29 regulations, and industry best practices. Use Case & Playbook Development: Design and maintain detection use cases tailored to automotive environments (e.g., CAN message flooding, firmware tampering). Develop and update response playbooks for in-vehicle attack scenarios. Collaborate with engineering and R&D teams to refine security detection logic. Hands-On Tools & Technology: Use in-vehicle IDS and anomaly detection tools (e.g., Argus, GuardKnox, Upstream Security, AutoCrypt). Work with automotive SIEM platforms and data aggregation tools. Apply EDR or endpoint monitoring to IVI systems, telematics control units (TCUs), and other connected components. Conduct packet analysis with automotive-specific tools (e.g., CANalyzer, Savari, Wireshark with CAN protocol plugins).
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
19947 Jobs | Dublin
Wipro
9475 Jobs | Bengaluru
EY
7894 Jobs | London
Accenture in India
6317 Jobs | Dublin 2
Amazon
6141 Jobs | Seattle,WA
Uplers
6077 Jobs | Ahmedabad
Oracle
5820 Jobs | Redwood City
IBM
5736 Jobs | Armonk
Tata Consultancy Services
3644 Jobs | Thane
Capgemini
3598 Jobs | Paris,France