Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
4.0 - 5.0 years
6 - 7 Lacs
Hyderabad
Work from Office
Implement and manage Network Access Control (NAC) systems to control access to network resources. Ensure security policies are enforced, prevent unauthorized access, and monitor network activity for potential threats.
Posted 3 weeks ago
6.0 - 10.0 years
15 - 25 Lacs
Gurugram
Work from Office
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Infrastructure Specialists at Kyndryl are project-based subject matter experts in all things infrastructure – good at providing analysis, documenting and diagraming work for hand-off, offering timely solutions, and generally “figuring it out.” This is a hands-on role where your feel for the interaction between a system and its environment will be invaluable to every one of your clients. There are two halves to this role: First, contributing to current projects where you analyze problems and tech issues, offer solutions, and test, modify, automate, and integrate systems. And second, long-range strategic planning of IT infrastructure and operational execution. This role isn’t specific to any one platform, so you’ll need a good feel for all of them. And because of this, you’ll experience variety and growth at Kyndryl that you won’t find anywhere else. You’ll be involved early to offer solutions, help decide whether something can be done, and identify the technical and timeline risks up front. This means dealing with both client expectations and internal challenges – in other words, there are plenty of opportunities to make a difference, and a lot of people will witness your contributions. In fact, a frequent sign of success for our Infrastructure Specialists is when clients come back to us and ask for the same person by name. That’s the kind of impact you can have! This is a project-based role where you’ll enjoy deep involvement throughout the lifespan of a project, as well as the chance to work closely with Architects, Technicians, and PMs. Whatever your current level of tech savvy or where you want your career to lead, you’ll find the right opportunities and a buddy to support your growth. Boredom? Trust us, that won’t be an issue. Your future at Kyndryl There are lots of opportunities to gain certification and qualifications on the job, and you’ll continuously grow as a Cloud Hyperscaler. Many of our Infrastructure Specialists are on a path toward becoming either an Architect or Distinguished Engineer, and there are opportunities at every skill level to grow in either of these directions. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Skills and Qualifications: A minimum of 5 years of experience in mainframe security administration. Proficiency in RACF administration, including user management, access control, and security policy implementation. Knowledge of mainframe security principles and practices. Understanding of mainframe systems (z/OS), JCL & REXX. Familiarity with security tools and technologies used in mainframe environments. Preferred Technical and Professional Experience: Experience with other mainframe security products such as ACF2 or Top Secret. Knowledge of encryption technologies and data protection methods. Understanding of regulatory requirements such as GDPR, HIPAA, or SOX. Proficiency in English Japanese language skills (preferred). Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 3 weeks ago
2.0 - 4.0 years
4 - 6 Lacs
Bengaluru
Work from Office
The Digital :Python, Unix / Linux Basics and Commands role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Digital :Python, Unix / Linux Basics and Commands domain.
Posted 3 weeks ago
2.0 - 6.0 years
4 - 8 Lacs
Bengaluru
Work from Office
The Unix / Linux Basics and Commands, RedHat Linux role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Unix / Linux Basics and Commands, RedHat Linux domain.
Posted 3 weeks ago
3.0 - 5.0 years
5 - 7 Lacs
Gurugram
Work from Office
The Security and Discipline Officer will be responsible for overseeing the safety, security, and discipline across the entire university campus. This includes supervising security personnel, maintaining surveillance infrastructure, ensuring student discipline, managing emergency preparedness, and coordinating with law enforcement and government authorities. The ideal candidate will be an experienced professional from the armed forces, capable of handling on-ground challenges with leadership, tact, and efficiency. Key Responsibilities Campus Security Oversight Supervise the deployment, conduct, and performance of on-ground security personnel. Ensure the protection of university buildings, schools, assets, and the physical safety of students, employees, and visitors. Oversee the functioning, upkeep, and periodic maintenance of surveillance systems including CCTV, alarms, access control, and turnstile gates. Monitor and manage university entry and exit points, including gate security and turnstile operations. Conduct regular security audits and risk assessments across all university zones. Evaluate and select outsourced security agencies for deployment of security guards. Monitor university parking and manage traffic movement, especially during peak hours and major campus events. Discipline Management Maintain discipline in all areas of the campus including academic blocks, corridors, parking zones, playgrounds, and entry/exit points. Handle disciplinary issues related to students and staff, both independently and in consultation with the university s Discipline Committee. Initiate and manage investigations falling under the scope of the university s Student Code of Conduct. Submit comprehensive incident reports and recommend disciplinary actions in line with institutional policies. Emergency Planning and Response Develop and implement security protocols including emergency response, physical protection, incident management, and crisis response. Lead mock drills for fire safety, disaster preparedness, and emergency evacuations involving students and staff. Establish and manage the University Emergency Response Team. Train staff on the operation of emergency equipment and ensure all such tools are functional and ready to use at all times. Liaison and Coordination Coordinate and maintain strong relationships with local police, government authorities, and ministry officials for approvals and regulatory compliance. Represent the university in external matters involving safety, legal escalations, and student/staff discipline. Facilitate necessary documentation and permissions from government departments for special security arrangements during VIP visits or large-scale university events. Lead a dedicated security team during events featuring chief guests, dignitaries, and celebrities to ensure their safety and smooth conduct of proceedings. Policy Development and Training Design and periodically update the university s security and discipline-related policies and SOPs. Conduct orientation and refresher training programs for security personnel and general staff. Lead awareness campaigns for students and employees on safety practices, campus discipline, and emergency responses. Qualifications and Skills Retired Army personnel with a proven track record in managing discipline, security operations, and leadership responsibilities. Proficiency in Microsoft Word and Excel for documentation, reporting, and communication. Excellent verbal and written communication skills in English and Hindi . Strong interpersonal skills and the ability to handle conflict with authority, professionalism, and fairness. Sound understanding of legal procedures , disciplinary protocols, and coordination with law enforcement and regulatory agencies. Demonstrated ability to develop and implement campus-wide safety initiatives and lead in crisis situations. Commitment to maintaining confidentiality, institutional integrity, and student/staff welfare. Preferred Location Candidates from Gurugram / Delhi will be given preference
Posted 3 weeks ago
2.0 - 5.0 years
4 - 7 Lacs
Karnataka
Work from Office
The Unix / Linux Basics and Commands role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Unix / Linux Basics and Commands domain.
Posted 3 weeks ago
10.0 - 14.0 years
13 - 17 Lacs
Hyderabad
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityNow Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will be responsible for defining the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve documenting the implementation of the cloud security controls and transitioning to cloud security-managed operations using SailPoint IdentityNow. Roles & Responsibilities:- Lead the design and implementation of SailPoint IdentityNow solutions for clients along with end to end project management- Hands on exp on doing following development work on SailPoint IDN application. Provisioning Workflows, Applications Setup, Account Group Aggregation, Task Definition and Scheduling, Analytics and Reporting, Rules, Email Templates, Role Management and Certification- Collaborate with cross-functional teams to ensure the security framework and architecture meet business requirements and performance goals.- Document the implementation of cloud security controls and transition to cloud security-managed operations.- Provide technical guidance and support to project teams and clients on SailPoint IdentiityNow solutions. Professional & Technical Skills: - Must Have Skills: Experience in SailPoint IdentityNow development and IAM project management- Strong understanding of identity and access management (IAM) concepts and technologies.- Experience in integrating SailPoint IdentityNow with other IAM solutions and systems. Experience in conducting security assessments and audits, identifying and mitigating security risks and vulnerabilities.- Good To Have Skills: Experience in PAM tools (CyberArk, security architecture, and security operations. Additional Information:- The candidate should have a minimum of 10 years of experience in Identity and Access Management domain- The ideal candidate will possess a strong educational background in computer science, information technology, or a related field, along with a proven track record of delivering impactful security solutions.- This position is based at our Hyderabad office. Qualification 15 years full time education
Posted 3 weeks ago
2.0 - 5.0 years
4 - 7 Lacs
Hyderabad
Work from Office
The Unix / Linux Basics and Commands role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Unix / Linux Basics and Commands domain.
Posted 3 weeks ago
1.0 - 5.0 years
3 - 5 Lacs
Lucknow
Work from Office
Responsibilities: Ensure security compliance & customer satisfaction Oversee facility ops & admin tasks Lead manpower planning, sourcing & handling Manage operations team for efficiency & safety Manpower handling manpower hiring
Posted 3 weeks ago
1.0 - 5.0 years
3 - 5 Lacs
Lucknow
Work from Office
Responsibilities: Ensure security compliance & customer satisfaction Oversee facility ops & admin tasks Lead manpower planning, sourcing & handling Manage operations team for efficiency & safety Manpower handling manpower hiring
Posted 3 weeks ago
2.0 - 6.0 years
4 - 8 Lacs
Mumbai
Work from Office
The Unix / Linux Basics and Commands, RedHat Linux role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Unix / Linux Basics and Commands, RedHat Linux domain.
Posted 3 weeks ago
5.0 - 8.0 years
9 - 13 Lacs
Bengaluru
Work from Office
Company Description POSITION Title Information Security Analyst-L2 Reporting To Manager Work Location Bangalore SUMMARY OF POSITION AND OBJECTIVES: Eurofins is ramping up the Security Operations Center and has a need to extend the L2 incident resolvers team. The person working in L2 SOC team receives incidents escalated from L1 SOC, gets to manage the findings and work towards remediation of the incidents found. He/she continuously operates the Security Incident process, driving the resolution of identified issues, as part of the team, bringing the necessary experience and expertise above the L1 SOC level. The role requires working in shift mode (24/7), after the initial ramp up period. POSITION & OBJECTIVES :(maximum 1000 characters (not including spaces) for posting on Eurofins website and career portals): : Monitoring and analysis of cyber security events with use of SIEM, IDS, EDR, antivirus, Internet Footprint tools, proxy solutions. Security Event Correlation as received from L1 SOC or Incident Response staff or relevant sources to determine increased risk to the business. Recognize potential, successful, and unsuccessful intrusion attempts/compromises thorough review and analysis of relevant event detail and summary information. Development and execution of SOC procedures. Educating and coaching the L1 colleagues. Triage security events and incidents, detect anomalies, and report/direct remediation actions. Ensure confidentiality and protection of sensitive data. Analysis of phishing emails reported by internal end users for cases going above L1. Working with remediation (IT Infra & Ops) teams on events and incident mitigation. Follow up on remediation activities. Support the SOC Manager in his duties (e.g. extension of SOC services to new sites). Support L3 colleagues as required. Technical Knowledge : Strong working knowledge of security-relevant data, including network protocols, ports and common services, such as TCP/IP network protocols and application layer protocols (e.g. HTTP/S, DNS, FTP, SMTP, Active Directory etc.). Experience and keen understanding of cybersecurity tools, including SIEM, IDS/IPS, antivirus and endpoint detection & response solutions. Experience in developing and maintaining Play/Runbooks and/or Standard Operating Procedures in a SOC environment. Strong troubleshooting, reasoning, and analytical problem-solving skills. Ability to communicate technical details effectively in writing and verbally to junior IT personnel and management. Keen on further developing oneself in the information security world and the security operations. Personal Qualities: Team player. Detail oriented. Excellent communication with technical leaders. Systems Thinking - the ability to see how parts interact with the whole (big picture thinking). Able to work under minimal supervision. EVOLUTION: The position performs in a Threat Researcher role. The Analyst will use advanced network and host based tools that will proactively search through datasets to detect and respond to imminent and potential threats that evade traditional security solutions. Candidate should be capable of clear communicating to varying audience across the organization, in addition to seeking and building consensus where it is needed to achieve a strengthened security posture. What we offer: Opportunity to grow in a demanding, fast-growing organization. Very attractive, multicultural, and friendly work environment in fast-growing international company (with more than 55 000 employees). Possibility to grow and make the next step in your professional career and self-development. A launch pad into various opportunities within many business lines of Eurofins globally. A chance to become part of a highly motivated international team of professionals Qualifications Masters degree or Bachelors degree (B.E, B.Tech) or equivalent Minimum of 2-3 years of professional experience as a SOC Analyst (L1 or L2), threat researcher or hunter or a similar comparable role dealing with incident handling, alert tracking, cybersecurity case management.
Posted 3 weeks ago
7.0 - 9.0 years
7 - 11 Lacs
Noida
Work from Office
We are seeking a highly experienced and skilled Senior Cybersecurity Professional to join our team. The candidate should have a deep understanding protecting an organization's data and systems from cyber threats by identifying vulnerabilities, responding to breaches, and implementing security measures. Primary Skills Leadership and Strategy: Develop and implement comprehensive cybersecurity strategies and policies. Lead and mentor a team of cybersecurity professionals. Stay updated with the latest cybersecurity trends and technologies. Identify and prioritize critical business functions in collaboration with organizational stakeholders Risk Management: Conduct risk assessments and vulnerability analyses. Develop and implement risk mitigation plans. Ensure compliance with industry standards and regulations. Perform security reviews, identify gaps in security architecture, and develop a security risk management plan. Incident Response: Lead incident response efforts and manage security breaches. Develop and maintain incident response plans and procedures. Conduct post-incident analysis and reporting. Security Operations: Oversee the implementation and management of security tools and technologies. Coordinate with IT teams to ensure secure system configurations. Secondary Skills Bachelor's or Master's degree in Computer Science, Information Technology, or a related field. Relevant certifications such as CISSP, CISM, CEH, or equivalent. Proven experience in cybersecurity leadership roles. Strong knowledge of cybersecurity frameworks and standards (e.g., NIST, ISO 27001). Excellent problem-solving and analytical skills. Strong communication and interpersonal skills.
Posted 3 weeks ago
1.0 - 6.0 years
0 - 0 Lacs
Chennai
Work from Office
Role & responsibilities Responsible for Security functions, protecting assets, frisking employees , preventing pilferages Preferred candidate profile Should be a ex-serivce man/para military/Police .
Posted 3 weeks ago
4.0 - 9.0 years
7 - 8 Lacs
Bengaluru
Work from Office
Security Manager Job Responsibilities Key Responsibilities: Develop and Enforce Security Policies: Create, implement, and enforce security policies, protocols, and procedures to ensure safety and security across all locations. Budget Management: Monitor and control the budget for security operations, ensuring that all security related expenses are managed efficiently. Recruitment and Training: Recruit, train, and supervise security personnel to ensure they are well prepared and capable of performing their duties effectively. Coordinate with Other Departments: Work closely with other managers and departments to address and fulfill security needs, ensuring seamless operations. Emergency Response Coordination: Lead and coordinate the security team during emergencies, ensuring a quick and efficient response to any incidents. Incident Investigation: Investigate any security breaches or incidents, implement corrective measures, and report findings to the management. Security Technology Management: Utilize and manage security technology, such as CCTV, alarms, and communication systems, to monitor and ensure the safety of all locations. Compliance with Local Laws: Ensure all security operations comply with local laws and regulations, particularly those specific to Karnataka and the other states where operations are conducted. Visitor and Access Management: Oversee the management of visitor access and ensure that all entry and exit points at various locations are secure. Liaison with Law Enforcement: Establish and maintain good relations with local law enforcement agencies to ensure prompt assistance during emergencies. Health and Safety: Ensure that all security operations are conducted in line with health and safety standards, minimizing risks to staff and visitors. Security Manager Work Closely with Chairman and know about VVIP protocol procedures. Requirements and Skills: Experience: Proven experience as a Security Manager or in a similar role is essential. Technology Proficiency: Strong understanding and experience in using security technology, such as CCTV systems, access control systems, and communication devices. Leadership Skills: Excellent leadership abilities to manage and motivate a team effectively. Emergency Response: Experience in emergency planning and the ability to remain calm and decisive under pressure. Communication Skills: Strong communication skills, both written and verbal, to effectively interact with team members, management, and external agencies. Problem Solving: Strong analytical skills to identify and resolve security related issues promptly. Local Knowledge: Familiarity with the local geography, culture, and legal requirements of Karnataka and neighboring states is a plus. Preferred Background: Candidates with previous experience in defense, army, territorial army, home guards, fire safety, or police services are preferred. Candidates who are willing to work more on fields are only preferred.
Posted 3 weeks ago
10.0 - 15.0 years
15 - 15 Lacs
Hyderabad, Chennai, Bengaluru
Work from Office
Information Security Manager: Job Title: Information Security Manager Work from Office Location: Bangalore/Chennai/Hyderabad Experience:9 + years No.of Positions: #womenhiring #womenintech #womendiversity this role is exclusive for female candidates. Required Skills: Hands-on experience with security technologies Experience in Information security and business continuity internal audits Strong Knowledge in risk management, ISO 27001, ISO 22301 PCI DSS, HIPAA, GDPR, SOC 2 Knowledgeable in security concepts, techniques, tools, methods, and practices Good technical in cyber security products Individually to perform the technical audits Roles and Responsibilities: Minimum 8 years of experience in managing security audits, such as, ISO 27001, HIPAA, SOC 1, SOC2, PCIDSS Including preparing control owners for audits, interpreting control requirements, reviewing control evidence for appropriateness, testing control effectiveness, presenting control evidence to external auditors, and audit planning with external auditors In-depth knowledge of security controls, interpreting control requirements for SOC 2, ISO, HIPAA, PCIDSS audits, reviewing control evidence for completeness an accuracy, and ensuring evidence provided to auditors satisfies control requirements. Ability to of plan and lead meetings with control owners and external auditors. Ability to clearly define control requirements to control owners or explaining control evidence to external auditors. Supports the Security Audit function by reviewing evidence submissions for accuracy and completeness, following up on audit requests, and helping to establish a continuous monitoring function. Assist in testing and verification of all controls and formulating reports documenting findings. Recommends and assists in the definition and implementation of security controls in accordance with enterprise policies, standards, and procedures. Work closely with internal business teams to assist in the identification and assessment of potential security risks, and establish risk owners, ratings, and management action plans. Ensure continuity of compliance with ISO27001 and ISO 22301, PCI DSS, HIPAA, GDPR Analyse the potential impact of new threats and communicate risks to relevant business units Manage security operations, analyze security exceptions, gather necessary background information, document exceptions and ensurethat the risk is recognized and managed with compensating controls Provide orientation to Business Units on Risk Assessment, Business Continuity Plan and Business Impact Analysis Facilitate in preparation of a Business continuity plan for each project and functions Conduct internal ISMS and BCMS audits and identify potential gaps in the system Prepare detailed and summary reports of assessments, and remediation plans as needed and advise internal stakeholders Report the audit findings on the potential weakness in the system and areas of improvement
Posted 3 weeks ago
7.0 - 12.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Job Title : Advance Software Engineer About the Connectivity Enablers The Aircraft Date Gateway routers are avionics networking computers, built to provide Cyber industrial-class security and connectivity to the aircraft. The securely connected platform enhances wireless connectivity, network domain switching, routing and Cyber security operations. ADGs ensure ready to send Avionics data to Honeywell Sentience Cloud. ADGs encompass Connectivity, Computation and Storage capabilities: SATCOM, 4G LTE Air-To-Ground connectivity links throughout the world; and 802.11ac WiFi for connectivity to passengers, crew, pilot and ground operations. The ADG also supports routing for both wireless and wired network connections and has an internal L2-managed Gigabit Ethernet Switch. The ADG includes other important Avionics interfaces such as ARINC 429, ASCB, AFDX, and aircraft discrete I/O and USB ports. ADG provides edge computing facility, for minimizing the response time, the power consumption, and the bandwidth cost, to deliver functionality such as big data collection, management, real-time communication, expandable peripherals, and various other services. Job Responsibilities: Implementing Cockpit Connectivity Software Excellent communication and problem-solving skills. Should possess excellent soft skills to work and deliver in an agile environment. Constantly look to automate manual and repetitive tasks while reducing or optimizing build/release times. Automate and implement the Continuous Integration and Continuous Deployment pipeline. Engage with teams and manage build requirements. Follow emerging technologies and build reusable code and libraries. Troubleshoot and debug Exiting product Installers. Serve as an expert on our system s installation for debugging & production. Have a firm understanding of requirements development, test plans and procedures HTSIND2025 Must have : Bachelor s degree in engineering (Electrical/Systems/Computer) Minimum 7+ years of engineering experience Core Skill Set : C, C++, Linux Protocols, Standard Template Library, Design Patterns, DevOps, Development in Linux Environment. Good understanding of Linux Kernel , Type 1/Type 2 hypervisors. Working experience with hypervisors will be a plus. Understanding various software development lifecycle Demonstrate the ability to develop efficient and high-quality software. Can quickly analyze, incorporate, and apply new information and concepts. Ability to consistently make timely decisions even in the face of complexity, balancing systematic analysis with decisiveness. Ability to convey subtle or complex messages clearly, as appropriate for the topic and audience. Some relevant experience Diverse and global teaming and collaboration Individuals who are self-motivated and able to work with little supervision, who consistently take the initiative to get things done Multi-tasking and has the ability to manage a variety of complicated tasks.
Posted 3 weeks ago
7.0 - 12.0 years
20 - 25 Lacs
Pune
Work from Office
Pune Qualifications Bachelor s degree in computer science, Information Security, or a related field. Advanced degrees or relevant certifications (e.g., CISSP, CISM, CEH) are preferred. Minimum of 7-12 years of experience in cybersecurity, with at least 3 years in a managerial role within an MSSP or similar environment. Deep knowledge of cybersecurity principles, threat detection, vulnerability management, and incident response. Familiarity with security technologies (e.g., SIEM, SOAR IDS/IPS, firewalls) is essential. At least one offensive security certification such as OSCP, OSCE, GPEN, or equivalent Microscan Communications private limited is looking for a seasoned MSSP Cybersecurity Manager to lead and manage our cybersecurity operations and services. The ideal candidate will have a strong background in cybersecurity, experience in a Managed Security Service Provider (MSSP) environment, and a proven ability to manage a team, implement security strategies, and deliver exceptional service to clients. The candidate must have very good exposure in red team auditing will act as Subject matter expert in managing VAPT and Red team / blue team services involves designing, implementing, and conducting red team operations and emulating threat actor tactics, techniques, and procedures. Identify and exploit vulnerabilities, assess security postures, and provide actionable insights to customers. Support Business teams by hand holding customers queries and providing right fit solutions. Responsibilities Oversee the design, implementation, and management of security solutions for clients. Ensure that security measures are effective and aligned with industry standards and best practices. Lead the incident response process, including detection, analysis, containment, eradication, and recovery. Ensure timely and effective resolution of security incidents. Manage, mentor, and develop a team of cybersecurity professionals. Promote a culture of continuous learning and improvement within the team. Serve as a key point of contact for client engagements related to cybersecurity services. Provide regular updates, insights, and recommendations to clients on their security posture. Develop and execute cybersecurity strategies that align with client needs and organizational goals. Evaluate and enhance existing security frameworks and processes. Ensure that cybersecurity operations comply with relevant regulations and standards. Prepare and present comprehensive security reports to clients and internal stakeholders. Stay updated on emerging threats, vulnerabilities, and cybersecurity trends. Integrate threat intelligence into security operations to strengthen defences and response strategies. Work closely with other departments, including IT, risk management, and compliance, to ensure a cohesive approach to security and risk management. Oversee the deployment and management of security tools and technologies. Assess and recommend new solutions to enhance security capabilities. Develop and execute complex attack scenarios and simulations to emulate real-world threats and test the robustness of our cybersecurity measures Collaborate with Customers Internal teams to analyse security findings, prioritize remediation efforts, and recommend effective mitigation strategies Create detailed reports outlining vulnerabilities, exploit techniques, and actionable recommendations for improving security posture Conduct threat hunting and map the attack surface Work with the business to review customer requirements and propose right solution that meets end customer s needs. Research and development of custom tools and malware payloads to support operations Provide technical expertise and guidance on offensive security techniques, tools, and procedures Participate in knowledge-sharing activities, such as training sessions and workshops, to foster continuous learning and skill development within the Security team. Requirements and Skills Experience with various SOC platforms and tools (e.g., Splunk, ArcSight, QRadar, Securonix). Familiarity with compliance frameworks such as GDPR, HIPAA, or PCI-DSS. Experience in offensive security roles, including penetration testing, red/purple teaming, and ethical hacking Strong knowledge of network, operating system, cloud, and web application security architecture Proficiency in using offensive security tools such as Metasploit, Burp Suite, Nmap, Nuclei, and Kali Linux Experience with command and control (C2) frameworks such as Cobalt Strike, Sliver, or Mythic Well-versed in at least one scripting or programming language such as Python, C++, C#, Java, Go, PowerShell Experience in creating custom tools and payloads that can evade defensive products In-depth understanding of attack vectors, exploit techniques, and vulnerability assessment methodologies, with experience in applying MITRE ATT&CK Excellent analytical skills with the ability to assess complex systems and identify security gaps Strong leadership and team management skills. Proven ability to lead and develop a high-performing team. Excellent verbal and written communication skills. Ability to articulate complex security concepts to both technical and non-technical audiences. Strong problem-solving abilities and a strategic mindset. Capable of making data-driven decisions and providing actionable insights. How to Apply ? Please read all job details clearly and apply exactly as mentioned below only if you meet eligibility criteria.
Posted 3 weeks ago
8.0 - 14.0 years
20 - 27 Lacs
Pune
Work from Office
Pune Qualifications Any bachelor s degree. Information Security, Cybersecurity, or a related field. certifications CEH & Compliance related ISO 27001-2013 & 22301 Lead Auditor & Implementer are preferred. Minimum of 8-14 years of experience in IT industry with 4-5 years of experience in cybersecurity & at least 3 years in a managerial role within an MSSP or similar environment This is a client-focused technical Presales role to support sales team to identify the customer requirement and to provide a best fit solution as per customers expectation. Design and propose solution of Managed Security Services provided by the organization to end customers. Drive and influence change across a variety of business areas, technologies, and platforms. Understanding the end customers requirement and consulting them with right approach to enable with appropriate Security practices and solutions for securing their business needs and objectives. Work with Vendors, Cross functional teams, and partners to plan, design and deliver Cyber security solutions to our end clients. Identify opportunities for the use and development of Cyber security capabilities and products. Provide direction and guidance to Security Operations Centre for creating value and getting aligned with various market trends and deliverables. Deliver information and cyber security product and project support and review capability throughout the product development lifecycle for successful delivery of any product and project. Ensure all the Security related standards and compliances are meet for captive as well as external customers. Engaging and aligning the SOC team to ensure clients deliverables are met. Responsibilities Cybersecurity Management: Oversee the design, implementation, and management of security solutions for clients. Ensure that security measures are effective and aligned with industry standards and best practices. Client Relations: Serve as a key point of contact for client engagements related to cybersecurity services. Provide regular updates, insights, and recommendations to clients on their security posture. Strategy Development: Develop and execute cybersecurity strategies that align with client needs and organizational goals. Evaluate and enhance existing security frameworks and processes. Compliance and Reporting: Ensure that cybersecurity operations comply with relevant regulations and standards. Prepare and present comprehensive security reports to clients and internal stakeholders. Conduct IT Security audit an implementation for clients. Collaboration: Work closely with other departments, including IT, risk management, and compliance, to ensure a cohesive approach to security and risk management. Tool and Technology Management: Oversee the deployment and management of security tools and technologies. Assess and recommend new solutions to enhance security capabilities. The role of the Security Presales Manager is to take a primary role in the Solution and designing of the Security Solutions services. What will you be doing? Act independently as an information and cyber security authority for business and technology clients. Heading the security service portfolio for the organisation. Identifying the Service strategies along with Business teams. Influence the information and cyber security roadmaps and solutions for products, channels, programmes, and projects. Proactive delivery of an assignment including initiating contact with the Client, analysis of client objectives, identification of information and cyber security responses and requirements, taking responsibility for assignment planning, delivery management, through to gaining user acceptance and sign-off for MSSP outputs. Ensure the end-to-end information and cyber security integrity and quality of solutions and product releases. Own the delivery of Security Solutions services to customers, providing timely output to stakeholders. Undertake and facilitate information and cyber security assessments/workshops for solutions during various development phases to ensure security weaknesses are identified and correctly managed, proposing solutions as required. Work with stakeholders to ensure residual risks are adequately mitigated to the degree that meets the risk appetite of the business. Timely and accurate recording of client interaction using appropriate systems. Support for the wider delivery and success of Security Solutions services Requirements and Skills Demonstrable understanding of security solutions and designs from a people, process, and technology perspective; including security technologies, controls, and assessment methodologies Strong relationship, communication, and stakeholder management skills Knowledge of information security frameworks and standards such as ISO27001/2, NIST, PCI DSS etc. and their application into diverse environments Experience with a Consultancy practise Knowledgeable about existing best practices for integration of security controls Understands core development methodologies and their associated technologies. Security certifications such as CEH, CISA, ISO 27001-2013 & 22301 Lead Auditor & Implementer and others from professional security organisations. Training and experience delivering security solutions for cloud-based services such AWS, Azure etc. To be successful in this role, you must have: High degree of understanding of the evolving global and internal IT environments Knowledge of all Threat areas (deliberate, accidental, internal, external) Extensive experience of the ISO 27001 Information Security Management framework Understanding of Cyber Essential Plus and similar government security standards Excellent interpersonal skills: writing, speaking, listening, persuading, and influencing and collaborating. Ability to foster motivation and encourage meeting of tight deadlines Superior analytical, evaluative, and problem-solving abilities Ability to learn new things quickly, to thrive on change, navigate ambiguity, and to strive for continuous improvement Understand the importance of managing change and its impact on individuals and the business How to Apply ? Please read all job details clearly and apply exactly as mentioned below only if you meet eligibility criteria.
Posted 3 weeks ago
7.0 - 12.0 years
9 - 14 Lacs
Bengaluru
Work from Office
Software Engineer / Analyst | AWS | Incident Management | Power BI | Vulnerability Management Who We Are The Security Operations Team is looking for a Security Operations Engineer to uphold security posture for Cisco. Security Operations focus on three pillars: Incident Response, Vulnerability Management, Threat Detection. We deliver a robust security program to help protect a portfolio of products. Deep technical, interpersonal, and relationship building skills are traits of successful employees. We emphasize the importance of working cross-collaboratively to achieve our goals and drive decisions. What Youll Do Serve as the incident commander during security incidents. Investigate alerts in Security Information and Event Management (SIEM) systems. Cyber threat identification, analysis and resolution Manage queues for vulnerability management tickets, security event tickets, and project tasks. Participate in on-call rotation to ensure 24/7 coverage. Respond to engineering teams with detailed information on vulnerabilities and processes. Run Projects scopes independently with limited guidance. Build scripts or automation to aid investigations or reduce workload efforts. Conduct postmortems on security incidents to identify improvements. Evaluate and articulate risk exceptions clearly. Participate in audit interviews to provide insights and information. Provide evidence requests to compliance teams efficiently. Complete tasks aimed at operational improvements. Mentor and motivate other team members in cyber threat analysis principles and operational efficiencies Create and update documentation playbooks for consistent procedures. Who You Are Mandatory Qualifications: Bachelor's degree in computer science, engineering or a related discipline Minimum of 7+ years' experience in Security Operations role or relevant security position Experience working in queue work Strong experience with SIEMs (Preferred Splunk) Strong experience in leading Incidents Strong Investigation skills Firm understanding of vulnerability management Prior experience working on-call rotation Preferred Qualifications: You have proven experience in the security field performing investigations, evaluating alerts, working and advising security best practices in cloud environments, running incidents as an incident commander. You are passionate about the opportunity to be part of an all-star team that is integral to security. You are motivated to work with multi-functional teams and drive things together to accomplish role objectives. You thrive in a fast-paced environment and seek ownership of large, critical projects. We're looking for people who enjoy crafting solutions to tackle problems rather than focusing on completing tasks as fast as possible. Experience working in Cloud infrastructures (AWS, GCP, OCI, etc.) Strong documentation skills Industry security certifications are a plus
Posted 3 weeks ago
4.0 - 9.0 years
11 - 15 Lacs
Hyderabad
Work from Office
In our always on world, we believe it s essential to have a genuine connection with the work you do. Are you excited by a challenge? Driven by learning and growth? Then joining CommScope s cybersecurity team may be the right next step for you. We are looking out for a Cyber Security Engineer to join our team in Hyderabad. In this role, you will serve as a key individual contributor on our Security Architecture and Engineering team. A CommScope Security Engineer is responsible for designing, implementing, maintaining, monitoring, and managing key technical security systems/controls that protect our business. Success in this role will require foundational understanding of technology stacks, security tooling, and securing cloud environments (Azure, GCP, AWS. Ideal candidates will be willing to grow their technical skills by working on a broad range of security technical controls in an environment where your contribution will matter. Your work will be critical to our organization s cyber security success. CommScope s security team takes pride in protecting the people, processes, and technologies that serve our customers, and their customers - the billions of people our products and services help to connect each day. Join us and pursue your personal best! How Youll Help Us Connect the World : Implement, maintain, monitor, and manage cyber security systems and controls. Deliver projects on time, within budget and in accordance with service level agreements (SLAs). Work in tandem with architects, senior engineers, the security operations center (SOC), incident responders (in cases of anomalous activity and host compromise), and technology infrastructure and development team members. Participate regularly change management meetings. Conduct performance and efficacy testing to stress the limitations of security solutions while at the same time ensuring business innovation and day-to-day processes are not negatively impacted. Collaborate with other team members to develop technical security standards and best practices across various security domains; socialize and evangelize to other technology teams. Articulate common practices and tactics used by malicious software and threat actors, along with associated remediation, to other IT teams. Assist members of the Governance, Risk, and Compliance team to answer technical questions from auditors and clients. Required Qualifications for Consideration: A bachelor s degree with Preferably 4+ years of cyber security experience, demonstrating increased responsibility and success in each role. Hands-on experience in implementing and supporting at least 2 security capabilities (firewalls, CASB, SSE, DLP, SIEM, endpoint, vulnerability scanning, PKI, MFA, CSPM, etc.) Previous professional experience in other IT / technical domains and communicating relevant domain information with a non-technical audience. Proven analytical and critical thinking skills. Strong interpersonal, written, and oral communication skills. Demonstrated customer service and solution-focused orientation. Ambitious and disciplined. Self-starter, able to manage one s own time and juggle competing tasks, proactively seeking prioritization and guidance when needed. You Will Excite Us If You Have: Hands-on experience working with a major public cloud provider, such as Azure, AWS, or GCP. Significant familiarity with Azure security controls and services. Familiarity with Netskope. Familiarity with Palo Alto Networks firewalls and related controls.
Posted 3 weeks ago
2.0 - 7.0 years
8 - 12 Lacs
Bengaluru
Work from Office
At Arctic Wolf, were not just navigating the cybersecurity landscape - were redefining it. Our global team of dedicated Pack members is driving innovation and setting new industry standards every day. Our impact speaks for itself: weve earned recognition on the Forbes Cloud 100, CNBC Disruptor 50, Fortune Future 50, and Fortune Cyber 60 lists, and we recently took home the 2024 CRN Products of the Year award . We re proud to be named a Leader in the IDC MarketScape for Worldwide Managed Detection and Response Services and earning a Customers Choice distinction from Gartner Peer Insights . Our Aurora Platform also received CRN s Products of the Year award in the inaugural Security Operations Platform category. Join a company that s not only leading, but also shaping, the future of security operations. Lead ML Developer The Lead ML Developer will be responsible for the design and development of complex and exciting platforms in our Arctic Wolf Labs department. They will drive the technical roadmap of the AI/ML platforms at Arctic Wolf and enable the AI/ML teams to contribute to our Security Research and Threat Intelligence products and initiatives, and will develop cutting-edge systems, services, and frameworks for Arctic Wolf Labs. We are looking for a developer with a strong foundation of AI/ML concepts and workflows to join our pack, support a practice that will continuously evolve and expand the capabilities of our data science team, and contribute to our security products and services. Arctic Wolf Labs is the research-focused division at Arctic Wolf focused on advancing innovation in the field of security operations. The mission of Arctic Wolf Labs is to develop cutting-edge technology and tools that are designed to enhance the company s core mission to end cyber risk, while also bringing comprehensive security intelligence to Arctic Wolf s customer base and the security community-at-large. Leveraging the more than six trillion security events the Arctic Wolf Security Operations Cloud ingests, parses, enriches, and analyzes each week, Arctic Wolf Labs is responsible for performing threat research on new and emerging adversaries, developing advanced threat detection models, and driving improvement in the speed, scale, and detection abilities of Arctic Wolf s solution offerings. The Arctic Wolf Labs team comprises security and threat intelligence researchers, data scientists, security development engineers with deep domain knowledge in artificial intelligence (AI), security R&D, as well as advanced threat offensive and defensive methods and technologies. Security Research Services Development partners with these groups to understand requirements, design & implement scalable, fault-tolerant solutions, and build the next generation of security capabilities for Arctic Wolf. As A Lead ML Developer At Arctic Wolf, You Will: Support R&D of distributed, highly scalable, and fault-tolerant microservices Use test-driven development techniques to develop beautiful, efficient, and secure code Create and scale high-performance services that bring new capabilities to Arctic Wolf s data science organizations Execute on deliverables on the roadmap of ML engineering, modeling, and operations at Arctic Wolf Influence the work of team members, and mentor emerging technical leaders. Develop trusted cross-team relationships to deliver solutions that span multiple areas of expertise Identify problems proactively and propose novel solutions to solve them Continuously learn and expand your technical horizons Our mission is simple: End Cyber Risk. We re looking for a Senior Principal Developer to be part of making that happen. We re Looking For Someone Who: Will collaborate closely with our data science and ML teams across different cybersecurity domains to define ML infrastructure requirements and build critical data services Can leverage MLOps best practices to design and develop scalable model training, evaluation, experimentation and deployment workflows Has extensive experience in ML training (local and distributed), feature extraction, dataset creation Is comfortable deploying software with CI / CD tools including Jenkins, Harness, Terraform etc. Is an expert at developing and deploying assets in the cloud - preferably AWS and Kubernetes using IAC (infrastructure as code) Can build a workflow orchestration platform to be used by other developers Has hands-on experience of 2+ years implementing data pipeline infrastructure for data ingestion and transformation near real-time availability of data for applications and ML pipelines Has experience designing optimized solutions for ingestion, curation of large datasets Has working knowledge of Data Lake technologies, data storage formats (Parquet, ORC, Avro), and query engines (Athena, Presto, Dremio) and associated concepts for building optimized solutions at scale Maintains a proficient level in one of the following programming languages or similar- Python, Java, Go Has experience with data pipelines tools (Flink, Spark or Ray) and orchestration tools such as Airflow, Dagster or Step Functions Is an expert in implementing data streaming and event-based data solutions (Kafka, Kinesis, SQS/SNS or the like) About the Company At Arctic Wolf, we foster a collaborative and inclusive work environment that thrives on diversity of thought, background, and culture. This is reflected in our multiple awards, including Top Workplace USA (2021-2024), Best Places to Work - USA (2021-2024), Great Place to Work - Canada (2021-2024), Great Place to Work - UK (2024), and Kununu Top Company - Germany (2024). Our commitment to bold growth and shaping the future of security operations is matched by our dedication to customer satisfaction, with over 7,000 customers worldwide and more than 2,000 channel partners globally. As we continue to expand globally and enhance our technology, Arctic Wolf remains the most trusted name in the industry. Our Values Arctic Wolf recognizes that success comes from delighting our customers, so we work together to ensure that happens every day. We believe in diversity and inclusion, and truly value the unique qualities and unique perspectives all employees bring to the organization. And we appreciate that by protecting people s and organizations sensitive data and seeking to end cyber risk we get to work in an industry that is fundamental to the greater good. We celebrate unique perspectives by creating a platform for all voices to be heard through our Pack Unity program. We encourage all employees to join or create a new alliance. See more about our Pack Unity here. We also believe and practice corporate responsibility, and have recently joined the Pledge 1% Movement, ensuring that we continue to give back to our community. We know that through our mission to End Cyber Risk we will continue to engage and give back to our communities. All wolves receive compelling compensation and benefits packages, including: Equity for all employees Flexible annual leave, paid holidays and volunteer days Training and career development programs Comprehensive private benefits plan including medical insurance for you and your family, life insurance (3x compensation), and personal accident insurance. Fertility support and paid parental leave Arctic Wolf is an Equal Opportunity Employer and considers applicants for employment without regard to race, color, religion, sex, orientation, national origin, age, disability, genetics, or any other basis forbidden under federal, provincial, or local law. Arctic Wolf is committed to fostering a welcoming, accessible, respectful, and inclusive environment ensuring equal access and participation for people with disabilities. As such, we strive to make our entire employee experience as accessible as possible and provide accommodations as required for candidates and employees with disabilities and/or other specific needs where possible. Please let us know if you require any accommodations by emailing recruiting@arcticwolf.com. Security Requirements Conducts duties and responsibilities in accordance with AWN s Information Security policies, standards, processes and controls to protect the confidentiality, integrity and availability of AWN business information (in accordance with our employee handbook and corporate policies). Background checks are required for this position.
Posted 3 weeks ago
3.0 - 8.0 years
5 - 10 Lacs
Mumbai
Work from Office
Assists the Director of Security in managing security operations on a daily basis. Areas of responsibilities include the protection and safety of property assets, employees, guests and property, accident and fire prevention and response. Ensures the continuous protection of guests, employees and hotel assets. Maintains logs, certifications and documents required by law and Standard Operating Procedures. CANDIDATE PROFILE Education and Experience High school diploma or GED; 3 years experience in the security/loss prevention or related professional area. OR 2-year degree from an accredited university in Criminal Justice or related major; 1 year experience in the security/loss prevention or related professional area. CORE WORK ACTIVITIES Managing Security Operations Assists in the development and implementation of emergency procedures. Recommends follow-up action for security breaches. Conducts investigation of all losses of property assets and refers to proper management for disposition. Deploys security staff to effectively monitor and protect property assets. Complies with all Corporate Security safety and security management guidelines and procedures. Completes proper documentation and reports all employee accident and general liability incidents to Claims Reporting Service. Conducts periodic patrols of entire property and parking areas. Recognizes success across areas of responsibility. Handles guest problems and complaints, settling disputes, and resolving grievances and conflicts, or otherwise negotiating with others. Identifies and makes recommendations for minimizing physical hazards and unsafe work practices. Implements action plans to monitor and control risk. Keeps abreast of local criminal activity as it may impact property. Maintains required reports and documentation regarding patrols of property and parking areas. Inspects all security equipment and ensures it is fully functioning. Provides means for obtaining necessary medical attention on a timely basis. Conducts hourly employee performance appraisals according to Standard Operating Procedures. Identifies the educational needs of others, developing formal educational or training programs or classes, and teaching or instructing others. Completes disciplinary procedures and documentation according to Standard and Local Operating Procedures (SOPs and LSOPs) and supports the Peer Review Process. Maintains first aid and CPR certifications required for Security officers. Implements local authority requirement for security and safety. Leading Security Teams Attends pre- and post-convention and weekly forecast meetings to understand group needs and gather critical information to communicate to security officers. Celebrates successes by publicly recognizing the contributions of team members. Communicates the importance of safety procedures, detailing procedure codes, ensuring employee understanding of safety codes, monitoring processes and procedures related to safety. Utilizes interpersonal and communication skills to lead, influence, and encourage others; advocates sound financial/business decision making; demonstrates honesty/integrity; leads by example. Solicits employee feedback, utilizes an "open door" policy and reviews employee satisfaction results to identify and address employee problems or concerns. Encourages and builds mutual trust, respect, and cooperation among team members. Identifies the developmental needs of others and coaching, mentoring, or otherwise helping others to improve their knowledge or skills. Provides guidance and direction to subordinates, including setting performance standards and monitoring performance. Provides personal assistance, medical attention, emotional support, or other personal care to others such as coworkers, customers, or patients. Serves as a role model to demonstrate appropriate behaviors. Providing and Ensuring Exceptional Customer Service Displays leadership in guest hospitality, exemplifies excellent customer service and creates a positive atmosphere for guest relations. Empowers employees to provide excellent customer service. Meets quality standards and customer expectations on a daily basis. Provides services that are above and beyond for customer satisfaction and retention. Conducting Human Resources Activities Assists in minimizing cost of accident claims through aggressive claims management. Brings issues to the attention of Human Resources as necessary. Strives to improve service performance. Administers property policies fairly and consistently. Additional Responsibilities Analyzes information and evaluates results to choose the best solution and solve problems. Develops and maintains a working relationship with local law enforcement authorities. Informs and/or updates the executives, the peers and the subordinates on relevant information in a timely manner. Provides information to supervisors, co-workers, and subordinates by telephone, in written form, e-mail, or in person. Provides guidance in setting health and safety policies and standards. Coordinates with Event Sales for VIP escort and media control for large events. .
Posted 3 weeks ago
4.0 - 8.0 years
6 - 10 Lacs
Bengaluru
Work from Office
Required Skills Technology | Scripting and Automation | Level 2 Support Technology | Network Security Fundamentals | Level 3 Support Technology | Secured Configuration Management | Level 3 Support Technology | Incident and Breach Response | Level 2 Support Technology | Endpoint Encryption | Level 2 Support Education Qualification : Engineer - B.E / B.Tech / MCA Certification Mandatory / Desirable : Technology | Certified Endpoint Detection and Response Professional/Certified Endpoint Security Administrator/Microsoft Certified: MD-100/CompTIA CySA+/CISSP/CISM/Cisco Certified CyberOps Associate/VMware Certified Professional - Desktop and Mobility Delivery Skills required are: - Advanced Technical Proficiency: - *Mastery of endpoint security solutions such as antivirus, endpoint detection and response (EDR), endpoint protection platforms (EPP), and mobile device management (MDM) systems. *Ability to configure, manage, and troubleshoot advanced endpoint security technologies effectively. *Advanced skills in conducting vulnerability assessments, prioritizing vulnerabilities, and overseeing remediation efforts across endpoint devices. Strategic Oversight and Management: - *Strategic oversight of endpoint security operations, including policy development, deployment strategies, and performance monitoring. *Collaboration with IT teams, network security specialists, compliance officers, and senior management to integrate endpoint security initiatives with broader organizational security strategies. *Facilitation of collaborative efforts to improve endpoint security posture and incident response capabilities. Communication and Stakeholder Management: - *Clear and concise communication of complex technical concepts, security risks, and recommendations to stakeholders at all levels. *Ability to articulate endpoint security issues, incident findings, and remediation strategies effectively. *Comprehensive documentation of endpoint security incidents, investigations, and remediation activities. Continuous Improvement and Adaptability: - *Commitment to staying updated with the latest cybersecurity trends, emerging threats, and technologies through ongoing training, certifications, and industry participation. *Implementation of continuous improvement initiatives to enhance endpoint security operations and resilience against evolving threats. Leadership and Mentorship: - *Mentorship of endpoint security team members to foster their professional growth and technical expertise. *Providing guidance on career development paths and skill enhancement within the endpoint security domain.
Posted 3 weeks ago
5.0 - 10.0 years
7 - 12 Lacs
Bengaluru
Work from Office
Amazons Supply Chain Transportation Solutions (SCTS) team is seeking a high-impact leader to develop and operate a world-class control tower for our Secure Surface Transportation Program (SSTP). This critical role will ensure the secure movement of our transportation vehicles, preventing theft and pilferage. As the Sr. Program Manager for SSTP, you will: Develop and implement an end-to-end supply chain security network for SCTS Execute tactical directives from leadership, driving implementation in collaboration with regional teams and stakeholders Identify and assess vendors security postures, pinpointing vulnerabilities and proposing mitigation strategies Drive, develop, and maintain the WWOS SCTS program, encompassing Global Mile, First Mile, and Middle Mile transportation operations Ensure compliance with internal and regulatory supply chain security programs (e.g., TAPA TSR) Lead continuous improvement initiatives, explore innovative solutions, and conduct industry benchmarking Track and analyze key metrics on compliance and loss prevention Spearhead the response to all on-road incidents, including thefts, pilferages, and accidents, ensuring business continuity and minimizing customer impact The ideal candidate will be a seasoned supply chain security professional with extensive experience in physical security, transport security, supply chain operations, and loss prevention. Youll work cross-functionally, both internally and externally, to elevate our security standards and protect our transportation network. This role offers the opportunity to Think Big, Invent and Simplify, and have a Bias for Action in safeguarding Amazons global transportation operations. Join us in setting new standards for supply chain security and delivering results that matter to our customers. Develop and operate the SSTP Control Tower, driving global strategic and operational objectives for SCTS. Collaborate cross-functionally with Global Mile, First Mile, Middle Mile, ATS, Legal, and Compliance teams to ensure seamless integration of security measures. Coordinate with cross-functional teams to implement an end-to-end secure network that detects, prevents, and resolves supply chain threats and losses. Drive implementation of transport standards (e.g., TAPA TSR) and vehicle quality standardization for ATS vehicles. Ensure compliance with security programs and requirements, maintaining meticulous documentation of procedures, reports, and training materials. Develop and execute plans to ensure all Amazon vehicles meet agreed standards, conducting regular audits based on TAPA and supply chain security processes. Provide timely, actionable insights on supply chain security compliance to internal stakeholders, aligning with INSLP guidelines. Stay at the forefront of industry best practices and regulatory security programs, continuously updating knowledge to enhance our security posture. Shape the strategic direction of supply chain security processes, ensuring robust risk mitigation across all regions and surface connections. Lead special projects aimed at strengthening supply chain security, demonstrating a bias for action and ability to deliver results. Remain current with global security practices (including C-TPAT, AEO, TAPA) and identify innovative trends and technologies to enhance supply chain security operations. This role requires a leader who can Think Big, Dive Deep, and Have Backbone; Disagree and Commit. Youll be expected to Invent and Simplify processes while maintaining the Highest Standards of security across our global network. - 5+ years of defining and executing against program timeline & requirements experience - Experience using data and metrics to determine and drive improvements - Experience implementing repeatable processes and driving automation or standardization - Bachelors degree - 5+ years of supply chain experience - Experience leading process improvements - Masters degree, or MBA in business, operations, human resources, adult education, organizational development, instructional design or related field
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
19947 Jobs | Dublin
Wipro
9475 Jobs | Bengaluru
EY
7894 Jobs | London
Accenture in India
6317 Jobs | Dublin 2
Amazon
6141 Jobs | Seattle,WA
Uplers
6077 Jobs | Ahmedabad
Oracle
5820 Jobs | Redwood City
IBM
5736 Jobs | Armonk
Tata Consultancy Services
3644 Jobs | Thane
Capgemini
3598 Jobs | Paris,France