Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5 - 9 years
7 - 11 Lacs
Pune
Work from Office
About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ? ? Role: Cyber Security Analyst L3 Skill: Fortinet Firewall Location: Pune Fortigate Firewall and F5 Technical Engineer (About The Role ) Basic Knowledge Required Comprehensive knowledge of firewalls, load balancers, and Secure Network Access Control (NAC) operations. Solid understanding of both static and dynamic routing protocols. Fundamental skills in packet capture and analysis. Work Experience At least 3 years of experience exclusively with Fortigate Firewalls. Experience with at least one other firewall platform, such as Cisco or Palo Alto. At least 3 years of experience exclusively with F5 Load Balancers. Proficient in F5 LTM/GTM implementation, design, and L2/L3 troubleshooting, with experience in the APM module of F5. Roles and Responsibilities Regularly engage with customers via voice calls, emails, and remote screen sharing to resolve issues within the SLA. Document solutions provided to customers in the ticketing tool. Troubleshoot P1/P2 incidents by collaborating with different teams to ensure timely resolution within the SLA. Prepare RCA documentation using the appropriate RCA template. Implement best practices or preventive measures based on RCA action items. Be willing to work in a 24/7 environment
Posted 1 month ago
5 - 8 years
5 - 9 Lacs
Bengaluru
Work from Office
About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: PingFederate. Experience5-8 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
1 - 3 years
6 - 10 Lacs
Ahmedabad
Work from Office
About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: Fortinet Firewall. Experience1-3 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
3 - 5 years
4 - 7 Lacs
Panchkula
Work from Office
Monitor surveillance cameras to detect and report suspicious activities or incidents. Operate CCTV systems, ensuring they are functioning properly and capturing necessary footage. Log and document all incidents, ensuring accurate records Required Candidate profile Strong understanding of CCTV systems and surveillance operations. Ability to identify potential security risks through visual monitoring. Good attention to detail and accurate incident documentation.
Posted 1 month ago
8 - 12 years
12 - 17 Lacs
Panchkula
Work from Office
Oversee the maintenance, safety, and security operations of the facility. Manage building systems, including electrical, plumbing, HVAC, and fire safety equipment. Develop and implement preventive maintenance schedules for all facilities Required Candidate profile Strong knowledge of building systems and maintenance. Excellent organizational and problem-solving skills. Leadership abilities for managing teams and external vendors.
Posted 1 month ago
5 - 9 years
4 - 8 Lacs
Bengaluru
Work from Office
Understand the existing security controls (including Endpoint Detection & Response, anti-malware and incident response) Engage with other IT teams including Network Engineering, Data Center, Service Desk to ensure a consistent approach for organizational support across the enterprise Understand the current state of the technology components in the IT stack ranging from networking, storage, compute (virtualization, containers), applications & security mgmt Establish non-production and production environments for testing and hosting the applications Adhere to the Scaled Agile Framework methodologies and tools that exists in the environment Participate in daily stand-up of Compliance & Security release train and contribute to bi-weekly sprints Learn System Engineering concepts to analyze existing environment and find more efficient ways Identify ways of doing things with full automation, AI and ML which needs knowing/learning the concepts of these technologies. Endpoint Security
Posted 1 month ago
3 - 6 years
3 - 7 Lacs
Hyderabad
Work from Office
JLL empowers you to shape a brighter way . Our people at JLL and JLL Technologies are shaping the future of real estate for a better world by combining world class services, advisory and technology for our clients. We are committed to hiring the best, most talented people and empowering them to thrive, grow meaningful careers and to find a place where they belong. Whether you ve got deep experience in commercial real estate, skilled trades or technology, or you re looking to apply your relevant experience to a new industry, join our team as we help shape a brighter way forward. Senior Facilities Executive Work Dynamics What this job involves? You will be responsible for managing all aspects of the facility management service delivery system in Accenture during the shift. In this capacity, the Assistant Facility Manager is accountable for the completion of pending works that needs high priority to complete in the required shift. Responsibilities Helpdesk/Mailroom Operations To provide management advice on Helpdesk/Mailroom for escalated issues during the shift To ensure immediate response to all priority calls from employees and Siebel team during the shift and follow escalation process To ensure accident or crises management is addressed immediately Clearing of C-mail / Government agencies mail to the proper recipient Front Office Operations To provide management advice for Front Office for escalated issues during the shift. To ensure immediate response to all priority calls during the shift and follow escalation process To take rounds of front office, lobby area, rest rooms to ensure a high standard of housekeeping & upkeep. To ensure immediate response to all priority calls during the shift and follow escalation process Security Operations Attending the shift briefing To ensure Security muster, deployment and make sure to acknowledge on the register for any penalties/comments for the improvement in security services To ensure that the security assignment manager or security in-charge of the facility is being updated on the clients/VIP visits To ensure that the security related issues are discussed with security assignment manager and also on priority for the shift and ensure there is an action and tracking for the issue closure. To ensure that security staff adheres to GAP norms. To discuss and assist facility manager and security Manager (pan India) on monthly basis on the vendor performance matrix. To ensure the Grooming of the staff To manage the overall key room, clock room and time office operations. To ensure weekly training is imparted and staff grooming standard is maintained. Answering the employees query on phone and mails replying. Ensure to implement all process/ procedures on ground effectively Housekeeping Operations Attending the shift briefing To ensure Housekeeping muster, deployment and ensure acknowledgment on the register for and penalties/comments for the improvement in housekeeping service To ensure that the housekeeping duty manager or housekeeping in-charge of the facility is being updated on the client s/VIP visits To ensure that the housekeeping related issues are discussed with housekeeping duty manager and also on priority for the shift and ensure there is an action and tracking for the issue closure To ensure a facility walk through to check on all rest rooms, breakout area, workstations, meeting rooms, cabins, common areas, development areas for the quality of the housekeeping services. Identification, on time closure and reporting of snags To discuss and assist facility manager on monthly basis on the vendor performance matrix Ensure all the Siebel housekeeping calls are closed on priority and within TAT without escalations Cafeteria Operations To ensure caterers maintain a high standard of hygiene & cleanliness in the services areas During food run out situation, ensure the matter is escalated to catering lead and coordinate with the catering vendor or any other alternative arrangements To ensure random food samples test is done by Accenture authorized vendor and results are taken up accordingly. To manage and supervise the quality, quantity and the cost of meal and refreshments being served in the cafeteria. To ensure that the operating hours, menus will be prominently displayed in all prominent places in the cafeteria. To conduct quarterly traffic analysis and ensure that waiting time on the cash counter and food counters and Sodexho counters shall be within tolerable limits. To ensure that the table & chairs are cleaned at all times and the frequency shall be modulated according to the traffic. To ensure that tracking is done on the vendor crockery like spoons, plates etc. to ensure no shortages. Should conduct monthly random Kitchen audit of the vendors. Escalate Facility Manager and then Accenture Lead on escalations. Ensure the hygiene of the cafeteria vendors operating in stalls. Ensure PPE are used by vendor staff while serving, cooking and washing. Answering the employees query on phone and mails replying. General Operations To ensure upkeep of breakout area & reprographic equipment s at all times and take necessary actions as required. To ensure all such communication is entered in the duty manager log book to inform the next shift person. Proper handing over and taking over to be done. To go for facility, walk around and ensure Walk around map & Guide is followed and maintained. To adhere to Accenture Policies, Processes & procedures and also the statutory documents To adhere to Accenture SLA & KPI as agreed with JLLM To assist Facility Manager in all such ISO, Internal, External, audits that happen at Accenture and ensure necessary documentation are done To coordinate with engineering team for any issues that need help. Plan & train TPV staff on Accenture policies and requirements. Daily and monthly updating of OLA in the SMDRS tool. Important and VIP client visits to be coordinated with Events team and should be managed without escalations. Should have complete knowledge & functionality e. Fit tools (VMT, IMT, Site Ops. Site Inspection tool), BGC and work permit tool. Should govern overall pest control, carpet maintenance, Wellness room, Ambulance, Indoor plants, Recreation room and Gym activities. Should conduct all the scheduled meeting and focus meets with projects as per calendar. Should participate and manage half yearly fire drill. All daily, weekly and monthly reports to be shared on time. All the relevant checklist to be governed and maintained as per requirement. Should be able to grab and adopt to all the new implemented initiatives Sound like you? To apply you need to be: Making and reviewing of DM, Helpdesk and Mailroom roster. Weekly & Monthly reports like MMR, FL Templates, etc. are prepared and shared on time. Taking interviews for Security manager, housekeeping manager and Helpdesk candidate. Assisting in maintaining requirement compliance score and all the parameters. Preparing and sharing JLL team attendance. Assisting FM/Sr. FM in additional requirement like handling escalations, any special reports Assisting FM in additional requirement like handling escalations and special reports. Conducting random audit for mailroom, helpdesk, time office, VMS, caf counters, Wellness room, cloak room, etc. and sharing the report with FM & respective department for actions. Managing workplace stores. Understating and managing of office services budget Conducting training for the team members and TPV staff on Ethics, Back to basic, code of conduct, BCP and Accenture process and policies Helping and training new joiners in the team Ensuring implementations and effectiveness of new initiatives. New initiatives Managing site operations in absence of WM. Coordinating with transport and event team on any important aspects. Assisting WM during crisis situation/BCP Ensure to have good knowledge about the polices & procedures of site specific What we can do for you: At JLL, we make sure that you become the best version of yourself by helping you realise your full potential in an entrepreneurial and inclusive work environment. We will empower your ambitions through our dedicated Total Rewards Program, competitive pay and benefits package. Location: On-site -Hyderabad, TS Scheduled Weekly Hours: 48 Job Tags: If this job description resonates with you, we encourage you to apply, even if you don t meet all the requirements. We re interested in getting to know you and what you bring to the table! JLL Privacy Notice Jones Lang LaSalle (JLL), together with its subsidiaries and affiliates, is a leading global provider of real estate and investment management services. We take our responsibility to protect the personal information provided to us seriously. Generally the personal information we collect from you are for the purposes of processing in connection with JLL s recruitment process. We endeavour to keep your personal information secure with appropriate level of security and keep for as long as we need it for legitimate business or legal reasons. We will then delete it safely and securely. For more information about how JLL processes your personal data, please view our Candidate Privacy Statement . For additional details please see our career site pages for each country. For candidates in the United States, please see a full copy of our Equal Employment Opportunity and Affirmative Action policy here . Jones Lang LaSalle ( JLL ) is an Equal Opportunity Employer and is committed to working with and providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process - including the online application and/or overall selection process - you may contact us at Accommodation Requests . This email is only to request an accommodation. Please direct any other general recruiting inquiries to our Contact Us page > I want to work for JLL.
Posted 1 month ago
1 - 5 years
3 - 7 Lacs
Bengaluru
Work from Office
Job Description: Black Box is seeking a highly skilled Senior Network Security Consultant with strong expertise in Enterprise Network Security technologies, including Perimeter Security, Firewalls (Fortinet, Cisco FTD, Palo Alto) , and SASE solutions (Zscaler, Prisma, Umbrella, etc.) . The ideal candidate will be responsible for ensuring the security and integrity of network systems by managing and maintaining critical security infrastructure. Key Responsibilities: Firewall Administration: Manage Fortinet, Cisco FTD, and Palo Alto firewalls, ensuring optimal security configurations and compliance with best practices. SASE & Proxy Management: Oversee SASE technologies (Zscaler, Prisma, Umbrella, etc.) and Proxy systems to enhance secure remote access and cloud security. Policy & Rule Configuration: Modify and validate firewall/VPN, IPS/IDS, SASE & Proxy policies based on business and security requirements. Incident Response & Troubleshooting: Proactively identify and resolve firewall/VPN, IPS/IDS, & Proxy issues, ensuring continuous security coverage. Security Enhancements: Provide technical support for initiatives improving the security posture of client networks. Automation & Optimization: Utilize existing tools and innovative solutions to enhance security operations, scalability, and reliability. 24x7 On-Call Support: Participate in a rotational roster for on-call duty to address critical incidents and security threats. Qualifications & Skills: Strong hands-on experience with Enterprise Network Security and Perimeter Security solutions. Extensive knowledge of Firewalls (Fortinet, Cisco FTD, Palo Alto), VPNs, IPS/IDS, and SASE technologies (Zscaler, Prisma, Umbrella, etc.) . Proficiency in managing network security policies, rule configurations, and troubleshooting security incidents . Familiarity with automated security processes to improve efficiency and scalability. Ability to provide technical expertise and support to enhance overall security frameworks. Experience in handling on-call security support in a 24x7 environment . Why Join Black Box? Work with cutting-edge network security technologies in a dynamic and innovative environment. Be part of a team that prioritizes security excellence and continuous improvement. Enjoy opportunities for career growth and professional development in a globally recognized organization.
Posted 1 month ago
1 - 4 years
3 - 6 Lacs
Mumbai
Work from Office
Job Description As a Customer Success Engineer at CyberArk, you will be a key product specialist within our Customer Success organization. Leveraging your expert product knowledge and strong communication skills, you will drive customer adoption, identify growth opportunities, and ensure successful renewals. You will collaborate closely with Professional Services, Sales, Channel teams, and customers to deliver a seamless onboarding experience and ongoing value. Responsibilities: Onboarding & Adoption: Guide new customers through the initial stages of their product journey, ensuring a smooth onboarding experience by partnering with Professional Services, Sales, and Channel teams. Customer Education: Conduct CyberArk Blueprint sessions to educate customers on Identity Security best practices and align their business outcomes with CyberArk solutions. Consultative Guidance: Provide prescriptive, consultative advice based on customers security objectives. Cross-Functional Collaboration: Proactively communicate and coordinate with internal teams and external stakeholders to ensure unified customer experience. Customer Engagement: Support targeted customer programs such as digital nurture follow-ups, sales and support how-to requests, live success sessions, and community engagement. Content Development : Create and present educational content for customer communities and webinar series to a broad audience of customers and channel partners. #LI-ZL1 #LI-HYBRID Qualifications Bachelor s degree in Computing, Engineering, or a related field (or equivalent experience). 5+ years of relevant experience in customer success, consulting, project management, support engineering, o
Posted 1 month ago
2 - 6 years
8 - 12 Lacs
Bengaluru
Work from Office
About The Role : Job TitleTechnology Service Analyst Corporate TitleNCT LocationBangalore, India Role Description The NCT will be responsible for ID Access management operations. You needs to ensure completion of day-to-day activity as per standards for administration of in scope applications/primary accounts in line with the IS security controls and objectives. The primary function of the role is to ensure all requests are processed within agreed SLA and with accuracy. You also needs to deliver quality services within a risk free and controlled environment, to ensure Deutsche Banks overall client satisfaction. What we'll offer you As part of our flexible scheme, here are just some of the benefits that youll enjoy, Best in class leave policy. Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Administrate global applications Monitor the activities of the team and random quality check on regular intervals to ensure adherence to IS objectives Ensure good team environment with an open communication culture. Liaise with the global managers ISO\ITAO and ensure that the process is running as per the procedures and standards laid down. To ensure completion/adherence of activity as per key operating procedure KOP. To ensure quality/quantity of processing is maintained as per the SLA. To ensure to maintain no KPI misses and no internal errors. Skilled in MS Word , Excel, Powerpoint Requires good understanding of ID administration, User recertification, Gatekeeper Processes and compliance and Risk. Bring out process development ideas from day-to-day activities and implement those. Ensure teamwork culture is practiced, and business requirement is addressed to with priority. Ensure proper back-ups are created and assist other teams during contingencies. Stakeholder management and escalation management. Excellent communication and leadership skills Organizational and time-management skills Your skills and experience Ideally the candidate should be minimum of 5 years of overall experience and minimum 2-3 years of relevant work experience in ID Administration or information security operations IDAM Operations experience. Hands on ID Administration knowledge Basic reporting and MIS knowledge management. Good understanding of Information security concepts Awareness on Risk and controls of ID administration. Exposure to Information security and risk assessment environments. Exposure to fast paced and challenging security Environment Education / Certification Graduates with good academic records. ITIL certified/ knowledge is desried Basic knowledge on ISO 27001 will be helpful. How we'll support you Training and development to help you excel in your career. Coaching and support from experts in your team. A culture of continuous learning to aid progression. A range of flexible benefits that you can tailor to suit your needs.
Posted 1 month ago
2 - 6 years
6 - 10 Lacs
Mumbai
Work from Office
About The Role : Job TitleClient Service Officer LocationMumbai, India Corporate TitleAssociate Role Description RTM-Client Service Officer acts as a single point of contact for managing all DB custody Clients for Security Services (SES) business. The scope of the role will to Settlements, Corporate Actions, Income, Reporting, Tax or Account administration across EMEA region What we'll offer you As part of our flexible scheme, here are just some of the benefits that youll enjoy. Best in class leave policy. Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Provide support to clients on all day-to-day, service/ transactional / client Management related queries applying the highest standards primarily for Securities Services clients across regions. Support with account opening/maintenance/closure for various regions in EMEA. Ensure smooth Onboarding/Offboarding of clients. Prepare and review Newsflash communication to all clients. Participate in Service level agreement preparation and reviews with clients. Participate in Client Calls with sales Team. Escalation management with Network Teams of Client. Manage and participate in Due Diligence visits or calls across EMEA regions. Identification of the need for client visits, their initiation and where necessary, participation. Client Complaints handling and resolution. Knowledge of Invoice and Fee Proposal preparation for clients. Regular Bi-weekly/monthly client meetings to identify growth opportunities in new markets. Participate in Technology projects for SES Business. Review & manage Client documentation. Work closely with client management team to ensure client delight. Contributes to Continuous Improvement activities leading to operational efficiencies. Your skills and experience German Language proficiency is a must. (C1). Have a minimum of 5 to 8 years client services / client facing experience overall and at least a year in the Securities Services business covering Custody & Clearing, Fund Services. Possess excellent communication skills, inter-personal skills and be a strong team player. Knowledge of the client set-up and the service agreements, including knowledge of the respective terms and conditions. Knowledge of markets and settlement practices across European markets. Knowledge of securities operation products, such as OTC settlement, CCP and Xetra settlement, auto-borrowing, etc. Prompt reaction to client and Network escalations. Verbal and written fluency in English/German and possibly other languages. Prompt communication/escalation of extraordinary, difficult, and risk-laden client complaints. Adherence to the internal control, reporting and compliance guidelines. Cooperation within the team, beyond the team (live an open-door policy) and adjoining departments. Realistic priority-setting under consideration of the total scope of tasks set. Efficient, structured, independent, and autonomous working. How we'll support you Training and development to help you excel in your career Coaching and support from experts in your team A culture of continuous learning to aid progression A range of flexible benefits that you can tailor to suit your needs
Posted 1 month ago
2 - 4 years
8 - 12 Lacs
Gurugram
Work from Office
Company: MMC Corporate Description: We are seeking a talented individual to join our GIS team at MMC Corporate This role will be based in Gurgaon. This is a hybrid role that has a requirement of working at least three days a week in the office. Global Cyber Defense - Security Operations Center What can you expect? We are looking for someone to join and grow in our Security Operations Center (SOC) in a technical analyst role on various daytime business hours shifts. As an Analyst, you will be responsible for analyzing security event data, assessing the potential impact of events, and creating recommendations to defend against emerging threats. You will follow security events through the triage and response lifecycle and document all processes in a centralized knowledgebase. In this role, you will participate in ongoing security incidents and continuous SOC initiatives, such as new content development and enrichment. Additionally, you will collaborate across multiple teams on various efforts to continue to strengthen the security posture of Marsh & McLennan Companies. What is in it for you? Be able to work with a global team with a company with a strong brand and strong results to match. Be part of an organization with a culture of internal mobility, collaboration, valued partnership from the business and drive for innovation in data & analytics, including the latest AI technology Grow your career with direct exposure to Senior Technologists, Business Leaders, and Employee Resource Groups which provide access relevant volunteer and mentoring opportunities and interactions with counterparts in industry groups and client organizations. Competitive pay (salary and bonus potential), Full benefits package - starting day one (medical, dental, vision, STD/LTD, life insurance, RSP (Retirement Savings Plan or TFSA (tax free savings account.) Entitled to vacation, floating holidays, time off to give back to your community, sick days, and national holidays. We will count on you to : Analyzing network traffic, endpoint security events, and other various log sources to identify threats, assess potential impact, and recommend mitigations Supporting other security functions and teams to ensure the holistic implementation of security controls, technologies, practices, and programs Contributing to the development and improvement of response processes, documentation, tool configurations, and detection logic Assisting in additional Security Operation Center initiatives, including playbook development and documentation, new rule creation, and tool evaluations Maintaining an operational knowledge of global threat trends, known threat actors, common tactics, techniques, and procedures (TTPs), and emerging security technologies Collaborating on Security Operation Center team training opportunities and other cross training opportunities Operating as a subject matter expert on various security topics across multiple domains Supporting 24x7 operations by assisting in ongoing incidents during non-standard hours What you need to have? Undergraduate degree in Computer Science (CS), Computer Information Systems (CIS), other related degrees, or equivalent experience 2+ years of information security experience and/or 2-4 years of experience in security analysis in a non-security focused role Excellent critical thinking skills, with proven analytical expertise and the ability to learn adaptively Demonstrated effective verbal, written and interpersonal communication skills with the ability to communicate security concepts to both technical and non-technical audiences Demonstrated experience with security technologies and alerts, such as intrusion prevention and detection systems, web proxies, SIEM, SOAR, EDR, firewalls, web application scanner, vulnerability scanners, forensics tools, open-source tools, or other security technologies Knowledge in one or more of the following domains: Network Operations and Architecture, Operating Systems, Identity and Access Management, Programming, Cloud Computing, Databases, or Cryptography What makes you stand out Ability to operate independently in a dynamic, evolving environment with multiple inputs and tasks simultaneously Knowledge of common attacks, current threats, threat actors, and industry trends Familiarity with common security frameworks and models, such as MITRE ATT&CK, Lockheed Martin Cyber Kill Chain, The Diamond Model of Intrusion Analysis and NIST Cybersecurity Framework Professional or technical certifications, such as Security+, GIAC Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH), or other related certifications Why join our team: We help you be your best through professional development opportunities, interesting work and supportive leaders. We foster a vibrant and inclusive culture where you can work with talented colleagues to create new solutions and have impact for colleagues, clients and communities. Our scale enables us to provide a range of career opportunities, as well as benefits and rewards to enhance your well-being.
Posted 1 month ago
1 - 6 years
30 - 40 Lacs
Palwal
Work from Office
Role & responsibilities We are looking for Ex-Army person who is experienced in Security Manager now. Understanding of general security policies and procedures. Security Policies Implementation General Admin/ Facility/ Infrastructure Management Resource, Budget & Cost Optimization Asset & Loss Protection Expertise in managing cross-functional roles including Security Management, General Administration, People Management, and Logistics & Transportation. Visionary leadership in handling cross-functional roles with a focus on ethical and enabling leadership. Proficient in liaising with organizations, institutions, and departments across various locations in India. Proficient in identifying, developing, and implementing security processes to reduce risks and respond to incidents. Skilled in crisis management, high-stake decision making, and advising on large-scale projects. Risk Assessment & Mitigation Record & Data Management Extensive experience in modern security practices, procedures, access control techniques, and vigilance measures. Preferred candidate profile Should be ex-Army Perks and benefits Best In Industry
Posted 1 month ago
1 - 3 years
1 - 3 Lacs
Hyderabad
Work from Office
We are looking for experienced security supervisor personnel to work in the Hospital Industry.
Posted 1 month ago
4 - 6 years
6 - 8 Lacs
Noida
Work from Office
We are looking for a self-motivated Cybersecurity Analyst to join the R1 Cybersecurity Operations Team. We have a relentless focus on driving results for our customers and enabling them to invest more in patient care; in turn, this allows us to continue to grow our company and your career. The successful candidate must be well-versed in security operations, cyber security tools, intrusion detection, and secured networks. They will serve as an expert and be responsible for providing network and security operations technical analysis, assessment, and recommendations in the areas of real-time security situational awareness, operational network system and applications systems security monitoring. Responsibilities : Monitoring various security tools (e.g., Crowdstrike, Proofpoint, MS Sentinel, Azure VM ) to identify potential incidents, network intrusions, and malware events, etc. to ensure confidentiality, integrity, and availability of R1s architecture and information systems are protected Reviewing and analyzing log files to report any unusual or suspect activities. Utilize incident response use-case workflows to follow established and repeatable processes for triaging and escalating. Generating trouble tickets and performing initial validation and triage to determine whether incidents are security events using open-source intelligence (OSINT) Following established incident response procedures to ensure proper escalation, analysis and resolution of security incidents. Analyzing and correlating incident event data to develop preliminary root cause and corresponding remediation strategy. Providing technical support for new detection capabilities, recommendations to improve upon existing tools/capabilities to protect the R1s network, and assessments for High Value Assets. In this role, the successful candidate will maintain and monitor compliance with enterprise change management policies and procedures. Develop and maintain metrics & reports on the status of the R1 cyber security operations program. Attend and participate in Cyber security projects and the change management process. This includes interacting with business units and technical teams to understand what is coming and how their projects can be more secure from the beginning. As part of the overall Cybersecurity Operations Team, work in tandem with the security operations center (SOC), incident responders (when anomalous activity and host compromise occurs), and technology infrastructure and development team members. Participate in established incident response procedures to ensure proper escalation,?analysis?and resolution of security events and incidents. Managing and maintaining change detection and auditing tools Researching technology and application processing environments, operation, and associated user workflow to design, build, configure, implement, and document change compliance and audit rules within designated technologies. Reconciling changes detected by the system to authorized changes documented in service desk and change management applications. Analyzing large volumes of security event data from a variety of sources to identify suspicious and malicious activity. Documenting, logging and investigating security incidents. Performing case management throughout the incident lifecycle for moderately complex security incidents Design, build, and documenting security technology standards, processes, and operational workflows Operating and maintaining physical security monitoring systems Review, investigate, track, and monitor viruses and malware propagation and eradication throughout the enterprise. Monitoring compliance with enterprise security, compliance, and change management programs, policies, and processes Researching Threat Intelligence sources on the latest malware, trends, patches in order to keep the Security Program up-to-date. Providing metrics & reports on the status of tools, environments, and assets within the organization. Database and Application security to prevent attacks via Input Validation, Cross-Site Scripting, Buffer Overflowetc Required Qualifications : A minimum of 4 years of professional experience in an IT-related field Intermediate knowledge of security, monitoring, and networking technologies, tools, protocols and standards Knowledge of security policy, programs, process, and metrics CompTIA Security+ certification or equivalent professional experience in security operations Intermediate or advanced security, networking, or audit certification Recent experience with static and/or dynamic code review process Strong drive and passion to deliver distinctive end-products, a quick learner with a strong attention to detail and quality. Excellent interpersonal and communication skills Desired Qualifications: A Bachelors degree in a technical discipline (e.g., Computer Science, Business Analyst, etc.) Certification (or ability to obtain certification) in at least one of the following areas: General Security (CISSP), Incident Handling (GCIH), Cloud Security (GCLD, Cloud+, CCSK), and Ethical Hacking (CEH) Experience with advanced cyber security tools, network topologies, intrusion detection, and secured networks In-depth understanding of NIST SP 800-61,?SOC 2 AICPA controls and frameworks. Working in an evolving healthcare setting, we use our shared expertise to deliver innovative solutions. Our fast-growing team has opportunities to learn and grow through rewarding interactions, collaboration and the freedom to explore professional interests. Our associates are given valuable opportunities to contribute, to innovate and create meaningful work that makes an impact in the communities we serve around the world. We also offer a culture of excellence that drives customer success and improves patient care. We believe in giving back to the community and offer a competitive benefits package. To learn more, visit: .
Posted 1 month ago
4 - 9 years
17 - 22 Lacs
Pune
Work from Office
About Zscaler Serving thousands of enterprise customers around the world including 40% of Fortune 500 companies, Zscaler (NASDAQ: ZS) was founded in 2007 with a mission to make the cloud a safe place to do business and a more enjoyable experience for enterprise users. As the operator of the world’s largest security cloud, Zscaler accelerates digital transformation so enterprises can be more agile, efficient, resilient, and secure. The pioneering, AI-powered Zscaler Zero Trust Exchange™ platform, which is found in our SASE and SSE offerings, protects thousands of enterprise customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Named a Best Workplace in Technology by Fortune and others, Zscaler fosters an inclusive and supportive culture that is home to some of the brightest minds in the industry. If you thrive in an environment that is fast-paced and collaborative, and you are passionate about building and innovating for the greater good, come make your next move with Zscaler. Our Engineering team built the world's largest cloud security platform from the ground up, and we keep building. With more than 100 patents and big plans for enhancing services and increasing our global footprint, the team has made us and our multitenant architecture today's cloud security leader, with more than 15 million users in 185 countries. Bring your vision and passion to our team of cloud architects, software engineers, security experts, and more who are enabling organizations worldwide to harness speed and agility with a cloud-first strategy. We're looking for an experienced Staff Security Researcher to join our Zscaler Threat Hunting team. Reporting to the Director, Zscaler Threat Hunting, you'll be responsible for: Analyze emerging threats, adversarial behaviors, and tactics, techniques, and procedures (TTPs) to understand attacker methodologies and improve detection capabilities Conducting proactive and retroactive threat hunting using Zscaler telemetry drawing from proven experience in behavioral-based threat hunting Researching, analyzing, validating, and clearly documenting threat hunting findings Independently hunting and responding to customers while working flexible schedules, including weekend night shifts and providing on-call support as needed to meet operational demands while getting two days off during the weekdays What We're Looking for (Minimum Qualifications) Proven experience in one or more of the following - threat hunting, incident response, security operations, malware analysis, blue teaming, purple teaming or network defence Hands-on experience in a Security Information and Event Management (SIEM) tool, such as Splunk, Microsoft Sentinel, or ElasticSearch Familiarity with MITRE ATT&CK framework and modern Tactics, Techniques, and Procedures (TTPs) Bachelor’s or graduate degree from four-year college or university (preferably in Computer Science, Engineering, or a related discipline), or equivalent security industry work experience What Will Make You Stand Out (Preferred Qualifications) Must be able to validate findings, perform root cause analysis, and deliver recommendations Scripting and automation skills (Python preferable) Must have excellent reporting and analytical skills and experience writing IDS/IPS, YARA signatures Experience in network-based threat detection #LI-Onsite #LI-AC10 At Zscaler, we believe in innovation, productivity, and success. We are looking for individuals from all backgrounds and identities to join our team and contribute to our mission to make doing business seamless and secure. We are guided by these principles as we create a representative and impactful team, and a culture where everyone belongs. Our Benefits program is one of the most important ways we support our employees. Zscaler proudly offers comprehensive and inclusive benefits to meet the diverse needs of our employees and their families throughout their life stages, including: Various health plans Time off plans for vacation and sick time Parental leave options Retirement options Education reimbursement In-office perks, and more! By applying for this role, you adhere to applicable laws, regulations, and Zscaler policies, including those related to security and privacy standards and guidelines. Zscaler is committed to providing equal employment opportunities to all individuals. We strive to create a workplace where employees are treated with respect and have the chance to succeed. All qualified applicants will be considered for employment without regard to race, color, religion, sex (including pregnancy or related medical conditions), age, national origin, sexual orientation, gender identity or expression, genetic information, disability status, protected veteran status, or any other characteristic protected by federal, state, or local laws. See more information by clicking on the Know Your Rights: Workplace Discrimination is Illegal link. Pay Transparency Zscaler complies with all applicable federal, state, and local pay transparency rules. For additional information about the federal requirements, click here . Zscaler is committed to providing reasonable support (called accommodations or adjustments) in our recruiting processes for candidates who are differently abled, have long term conditions, mental health conditions or sincerely held religious beliefs, or who are neurodivergent or require pregnancy-related support.
Posted 1 month ago
7 - 12 years
10 - 19 Lacs
Ahmedabad
Work from Office
Safety of employees & assets in the State . Person Should be in a similar large role . Certified protection professional, intelligence/info collection skills, leadership qualities ; Basis Military/Police training/ certified protection specialists. Required Candidate profile Candidates experience should not be more than 15 years . vehicle monitoring during patrolling, day patrols, SOP and Processes , state liaison, man/ material movement management at sites
Posted 1 month ago
3 - 8 years
19 - 24 Lacs
Bengaluru
Work from Office
Our vision for the future is based on the idea that transforming financial lives starts by giving our people the freedom to transform their own. We have a flexible work environment, and fluid career paths. We not only encourage but celebrate internal mobility. We also recognize the importance of purpose, well-being, and work-life balance. Within Empower and our communities, we work hard to create a welcoming and inclusive environment, and our associates dedicate thousands of hours to volunteering for causes that matter most to them. Chart your own path and grow your career while helping more customers achieve financial freedom. Empower Yourself. What you will do Conduct security operations necessary to maintain the confidentiality, availability, and integrity of enterprise data and information systems. Provide excellent customer service for internal and external customers in support of security initiatives, incident response, and support Maintenance of security tools and technologies throughout the enterprise environment such as Palo Alto Firewall features (e.g., App-ID, User-ID, threat prevention, and content filtering). Manage and troubleshoot Prisma Access for secure remote connectivity. Supporting and Troubleshooting network security in AWS and Azure environments. Evaluate, design, and implement security related solutions, adhering to established change control processes Provide technical security planning, implementation, configuration, support and troubleshooting services on all security technologies. Provide accurate, clear, and concise documentation of system requirements, specifications, and final builds. Perform all necessary functions associated with the implementation and integration of security tools and platforms into the enterprise environment. Coordinate with systems and network engineers to ensure servers and network devices conform to security standards, and that security devices and controls are working as designed Assist with the development, implementation, and administration of information security policies, standards, and procedures, adhering to industry best practices Assist in ensuring that the corporate IT environment is secure and complies with all internal and external audit requirements Identify potential security risks, and define and document remediation options or mitigating controls Validate security control coverage against identified IOCs based on emerging cyber threat intelligence Collaborate with the Offensive Security team to analyze and evaluate the effectiveness of existing security controls against identified TTPs Assist in the management of an Incident Response Team that addresses potential or in-progress security events, establishing and adhering to escalation procedures and response times Maintain certifications and keep up-to-date with current information technology Participate in 24x7 on-call rotation Perform related duties as requested Job Qualifications (Must meet at least three of the below requirements) 5+ years of experience with managing security controls, to include defining policies and administering devices such as Paloaltonetworks firewalls, Paloaltonetworks Prisma, IDS/IPS platforms, and e-mail/web filtering solutions 2+ years experience in AWS and Azure cloud operations 5 + years of technical experience working with security solutions and conducting security operations 3+ years of network security experience and reviewing security tools and solutions and making recommendations on utilization and strategy 1+ years web application firewalls 5 + years of experience with network protocols, data flows and attacks within an IP environment 3+ years of experience in building configurations for security devices and building an automated process to support large-scale deployment Good knowledge and experience with security software, firewalls, intrusion detection systems and other security systems and network monitoring. 3+ years hands-on technical knowledge of network systems, protocols, and standards such as Ethernet, LAN, WAN and TCP/IP. 3+ years of experience with commercial and open-source security applications and technologies (e.g. malware prevention, DLP, IDS/IDP, and cryptography), as well as related protocols and tools (e.g. SSH, SSL/TLS, snort, port scanners, rootkit detectors, etc.) 3+ Implement security measures for Kubernetes clusters and containerized applications. 3+ years of experience performing network and application security administration 2+ years programming/scripting experience –Python, shell What you will bring Bachelor s degree in Information Technology, Computer Science, or related field and 5 years experience in information technology or related field within the last 10 years Preference will be given to those with degrees in Computer Science, Information Technology, Mathematics, Engineering (various disciplines), and other technology-focused areas. Must have Palo certification and AWS Solutions Arch This job description is not intended to be an exhaustive list of all duties, responsibilities and qualifications of the job. The employer has the right to revise this job description at any time. You will be evaluated in part based on your performance of the responsibilities and/or tasks listed in this job description. You may be required perform other duties that are not included on this job description. The job description is not a contract for employment, and either you or the employer may terminate employment at any time, for any reason, as per terms and conditions of your employment contract. We are an equal opportunity employer with a commitment to diversity. All individuals, regardless of personal characteristics, are encouraged to apply. All qualified applicants will receive consideration for employment without regard to age, race, color, national origin, ancestry, sex, sexual orientation, gender, gender identity, gender expression, marital status, pregnancy, religion, physical or mental disability, military or veteran status, genetic information, or any other status protected by applicable state or local law.
Posted 1 month ago
1 - 2 years
11 - 15 Lacs
Bengaluru
Work from Office
Education: Bachelor s degree in Cybersecurity, Information Technology, Computer Science, or a related field. Experience: 1-2 years of experience in Security operation center (SOC), or a related role. Experience in CrowdStrike SIEM and EDR preferred. Analytical Skills: Ability to analyze and interpret security data to identify potential threats. Communication Skills: Strong verbal and written communication skills for documenting incidents and collaborating with team members. Attention to Detail: High level of attention to detail to accurately monitor and assess security alerts. Certifications (Preferred): Certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or similar. Typically works in a security operations center. May require shift work to provide 24/7 monitoring. . Analyze and investigate security alerts to determine their validity and severity. Perform initial triage and escalation of security incidents to appropriate teams or individuals. Follow established procedures for incident response, including containment, eradication, and recovery. Document incident details, actions taken, and recommendations for future improvements. Collaborate with other MDR team members and cross-functional teams to investigate and resolve security incidents. Assist in the development and maintenance of MDR procedures, processes, and documentation. Stay current with emerging threats, vulnerabilities, and security technologies.
Posted 1 month ago
2 - 4 years
13 - 17 Lacs
Gurugram
Work from Office
Company: MMC Corporate Description: We are seeking a talented individual to join our GIS team at MMC Corporate This role will be based in Gurgaon. This is a hybrid role that has a requirement of working at least three days a week in the office. Global Cyber Defense - Security Operations Center What can you expect? We are looking for someone to join and grow in our Security Operations Center (SOC) in a technical analyst role on various daytime business hours shifts. As an Analyst, you will be responsible for analyzing security event data, assessing the potential impact of events, and creating recommendations to defend against emerging threats. You will follow security events through the triage and response lifecycle and document all processes in a centralized knowledgebase. In this role, you will participate in ongoing security incidents and continuous SOC initiatives, such as new content development and enrichment. Additionally, you will collaborate across multiple teams on various efforts to continue to strengthen the security posture of Marsh & McLennan Companies. What is in it for you? Be able to work with a global team with a company with a strong brand and strong results to match. Be part of an organization with a culture of internal mobility, collaboration, valued partnership from the business and drive for innovation in data & analytics, including the latest AI technology Grow your career with direct exposure to Senior Technologists, Business Leaders, and Employee Resource Groups which provide access relevant volunteer and mentoring opportunities and interactions with counterparts in industry groups and client organizations. Competitive pay (salary and bonus potential), Full benefits package - starting day one (medical, dental, vision, STD/LTD, life insurance, RSP (Retirement Savings Plan or TFSA (tax free savings account.) Entitled to vacation, floating holidays, time off to give back to your community, sick days, and national holidays. We will count on you to : Analyzing network traffic, endpoint security events, and other various log sources to identify threats, assess potential impact, and recommend mitigations Supporting other security functions and teams to ensure the holistic implementation of security controls, technologies, practices, and programs Contributing to the development and improvement of response processes, documentation, tool configurations, and detection logic Assisting in additional Security Operation Center initiatives, including playbook development and documentation, new rule creation, and tool evaluations Maintaining an operational knowledge of global threat trends, known threat actors, common tactics, techniques, and procedures (TTPs), and emerging security technologies Collaborating on Security Operation Center team training opportunities and other cross training opportunities Operating as a subject matter expert on various security topics across multiple domains Supporting 24x7 operations by assisting in ongoing incidents during non-standard hours What you need to have? Undergraduate degree in Computer Science (CS), Computer Information Systems (CIS), other related degrees, or equivalent experience 2+ years of information security experience and/or 2-4 years of experience in security analysis in a non-security focused role Excellent critical thinking skills, with proven analytical expertise and the ability to learn adaptively Demonstrated effective verbal, written and interpersonal communication skills with the ability to communicate security concepts to both technical and non-technical audiences Demonstrated experience with security technologies and alerts, such as intrusion prevention and detection systems, web proxies, SIEM, SOAR, EDR, firewalls, web application scanner, vulnerability scanners, forensics tools, open-source tools, or other security technologies Knowledge in one or more of the following domains: Network Operations and Architecture, Operating Systems, Identity and Access Management, Programming, Cloud Computing, Databases, or Cryptography What makes you stand out Ability to operate independently in a dynamic, evolving environment with multiple inputs and tasks simultaneously Knowledge of common attacks, current threats, threat actors, and industry trends Familiarity with common security frameworks and models, such as MITRE ATT&CK, Lockheed Martin Cyber Kill Chain, The Diamond Model of Intrusion Analysis and NIST Cybersecurity Framework Professional or technical certifications, such as Security+, GIAC Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH), or other related certifications Why join our team: We help you be your best through professional development opportunities, interesting work and supportive leaders. We foster a vibrant and inclusive culture where you can work with talented colleagues to create new solutions and have impact for colleagues, clients and communities. Our scale enables us to provide a range of career opportunities, as well as benefits and rewards to enhance your well-being. Marsh McLennan (NYSE: MMC) is the world s leading professional services firm in the areas of risk, strategy and people. The Company s more than 85,000 colleagues advise clients in over 130 countries. With annual revenue of $23 billion, Marsh McLennan helps clients navigate an increasingly dynamic and complex environment through four market-leading businesses. Marsh provides data-driven risk advisory services and insurance solutions to commercial and consumer clients. Guy Carpenter develops advanced risk, reinsurance and capital strategies that help clients grow profitably and pursue emerging opportunities. Mercer delivers advice and technology-driven solutions that help organizations redefine the world of work, reshape retirement and investment outcomes, and unlock health and well being for a changing workforce. Oliver Wyman serves as a critical strategic, economic and brand advisor to private sector and governmental clients. For more information, visit marshmclennan.com , or follow us on LinkedIn and X . Marsh McLennan is committed to hybrid work, which includes the flexibility of working remotely and the collaboration, connections and professional development benefits of working together in the office. All Marsh McLennan colleagues are expected to be in their local office or working onsite with clients at least three days per week. Office-based teams will identify at least one anchor day per week on which their full team will be together in person Marsh McLennan (NYSE: MMC) is a global leader in risk, strategy and people, advising clients in 130 countries across four businesses: Marsh, Guy Carpenter, Mercer and Oliver Wyman . With annual revenue of $24 billion and more than 90,000 colleagues, Marsh McLennan helps build the confidence to thrive through the power of perspective. For more information, visit marshmclennan.com , or follow on LinkedIn and X.
Posted 1 month ago
2 - 6 years
2 - 5 Lacs
Hyderabad
Work from Office
IS Specialist OT Security What you will do Let’s do this. Let’s change the world. In this vital role you will [responsible for developing and implementing security strategies that protect industrial control systems (ICS), SCADA networks, and other manufacturing infrastructure components. This role ensures the integrity, availability, and confidentiality of OT environments by integrating security monitoring, risk management, and compliance efforts into industrial operations. The OT Security Engineer works closely with Security Operations, Engineering and Infrastructure, and Operations to safeguard systems against cyber threats. Key responsibilities include implementing security best practices for OT, managing vulnerabilities, and collaborating with stakeholders to enhance the security posture of OT environments. . Roles & Responsibilities: Define, lead, and implement security strategies for OT environments, focusing on Industrial Control Systems (ICS) and SCADA. Implement and manage OT-specific security monitoring tools, ensuring real-time detection and response to cyber threats. Collaborate with engineering and operational teams to integrate security measures into OT network architectures. Assess and mitigate vulnerabilities in OT environments, ensuring compliance with industry standards (e.g., NIST 800-82, IEC 62443). Support security incident response efforts, including forensic analysis and remediation of threats in industrial environments. Coordinate with vendors, partners, and government agencies to address OT cybersecurity challenges. Develop security policies, procedures, and guidelines tailored to OT environments. Provide training and awareness programs to operational teams regarding OT cybersecurity best practices. Maintain relationships with vendors and strategic partners to enhance security capabilities. What we expect of you We are all different, yet we all use our unique contributions to serve patients. The [vital attribute] professional we seek is a [type of person] with these qualifications. Basic Qualifications: Master’s degree with 4- 6years of experience in Information Systems or related field OR Bachelor’s degree with 6- 8years of experience Information Systems or related field OR Diploma with 10– 12years of experience in Information Systems or related field Preferred Qualifications: Must-Have Skills: Solid understanding of ICS, SCADA, and OT security principles Experience with network segmentation, firewalls, and intrusion detection systems in OT environments Knowledge of industrial protocols (e.g., Modbus, DNP3, BACnet, OPC, CIP) and their security implications Understanding of risk management frameworks (e.g., NIST 800-82, IEC 62443, NERC CIP) Experience with security monitoring and detection in OT environments Good-to-Have Skills: Experience with security assessments and penetration testing for OT networks Proficiency in security tools (e.g., Nozomi Networks, Dragos, Claroty, Armis) Knowledge of cloud security and how it integrates with OT environments Scripting and automation skills (e.g., Python, PowerShell) Familiarity with compliance and regulatory requirements for critical infrastructure Professional Certifications (please mention if the certification is preferred or required for the role): GICSP (Global Industrial Cyber Security Professional) – Preferred CISSP (Certified Information Systems Security Professional) – Preferred ISA/IEC 62443 Cybersecurity Certificate – Preferred CompTIA Security+ – Preferred Soft Skills: Excellent analytical and troubleshooting skills Strong verbal and written communication skills Ability to work effectively with global, virtual teams High degree of initiative and self-motivation Ability to manage multiple priorities successfully Team oriented, with a focus on achieving team goals Strong presentation and public speaking skills What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Posted 1 month ago
2 - 5 years
2 - 6 Lacs
Hyderabad
Work from Office
SOC T1 Analyst What you will do Let’s do this. Let’s change the world. In this vital role you will responsible for the initial response to security events and incidents within a 24/7 Cybersecurity Operations Center (CSOC). This role involves following established procedures to investigate security events, providing feedback to improve processes, and assisting in the incident response lifecycle. Additionally, the associate will participate in knowledge-sharing sessions and correlate security alerts across platforms. Roles & Responsibilities: Follow established procedures to triage, investigate and respond to security events and incidents. Provide feedback to senior analysts to improve, review, and optimize existing procedures and documentation. Correlate security alerts from various platforms based on common elements. Participate in and lead CSOC Tier 1 knowledge-sharing and learning sessions. Assist incident responders in coordinating the response, containment, eradication, recovery, and lessons learned phases of the incident response lifecycle. What we expect of you We are all different, yet we all use our unique contributions to serve patients. Basic Qualifications: Bachelor’s degree with 1 to 3 yeras of experience in Security Operations or related field OR Diploma with 4 to 7 year of experience in Security Operations or related field Solid understanding of security technologies and their core functionality Experience in analyzing cybersecurity threats with up-to-date knowledge of attack vectors and the cyber threat landscape. Ability to prioritize tasks effectively and solve problems efficiently in a diverse, global team environment. Good knowledge of Windows and/or Linux systems. Preferred Qualifications: Familiarity with CSOC operations and incident response procedures. Experience with security alert correlation across different platforms. Professional Certifications: CompTIA Security+ (preferred) CEH (preferred) GSEC (preferred) MTA Security Fundamentals (preferred) Soft Skills: Strong communication and collaboration skills, especially when working with global teams. Ability to prioritize and manage tasks in high-pressure situations. Critical thinking and problem-solving abilities in cybersecurity contexts. A commitment to continuous learning and knowledge sharing. Work Hours: This position requires you to work a later shift and may be assigned a second or third shift schedule. Candidates must be willing and able to work during evening or night shifts, as required. Potential Shifts (subject to change based on business requirements)Second Shift2:00pm – 10:00pm IST; Third Shift10:00 pm – 7:00 am IST. What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Posted 1 month ago
12 - 22 years
7 - 12 Lacs
Kolkata, Bengaluru, Mumbai (All Areas)
Work from Office
Hiring for Security Operation Branch Head Position. Experience: 12 Years + Salary : As per market standard Location: Bangalore, Mumbai, Goa, Pune, Kolkata, Guwahati, Odisha
Posted 1 month ago
3 - 8 years
5 - 15 Lacs
Noida, Chennai
Hybrid
Job Title: Level 3 Security and Infrastructure Engineer Location: India Job Description: We are looking for an experienced Level 3 Security and Infrastructure Engineer with a strong focus on Security Operations to join our team. This role involves monitoring and managing security operations while also supporting critical infrastructure. The ideal candidate will be adept at analyzing SIEM logs, working with Darktrace, and implementing security action plans, alongside managing Windows, Linux, Office 365, and AWS Cloud Infrastructure. The role will focus approximately 60% on Security Operations and 40% on Infrastructure Management . Key Responsibilities: Security Operations (60%) Continuously monitor, analyze, and respond to security events using SIEM tools . Use Darktrace or similar AI-based security tools to identify anomalies and mitigate risks. Lead incident response efforts , including root cause analysis, containment, and remediation. Conduct regular security assessments, including log analysis, threat hunting, and vulnerability scans. Develop and maintain actionable incident response playbooks and ensure team readiness. Collaborate with internal teams to ensure security compliance with SOC-2 and HITRUST standards. Proactively recommend and implement security improvements to strengthen the overall organizational security posture. Infrastructure Management (40%) Manage and maintain Linux (LAMP), Windows Active Directory environments, including Group Policies, DNS, and security configurations. Administer Office 365 applications and services, ensuring secure configurations and uptime. Deploy, monitor, and optimize AWS Cloud Infrastructure , including EC2, S3, IAM, and security groups. Support infrastructure projects involving migrations, upgrades, and automation while aligning them with security best practices. Provide Level 3 escalation support for infrastructure-related issues and incidents. Required Skills & Qualifications: Bachelors degree in Computer Science, Information Technology, or relevant experience in related field. 2+ years of experience in security operations and infrastructure management. Experience with SIEM tools and interpreting security logs. Solid understanding of security frameworks and threat detection methodologies. Proficiency in managing Linux, Windows AD , Office 365 , and AWS cloud environments . Strong analytical and troubleshooting skills for both security and infrastructure challenges. Excellent communication skills with the ability to document and present findings clearly. Hands-on experience with Darktrace or similar AI-based security platforms is a bonus. Preferred Skills: Industry certifications such as CISSP , CEH , AWS Security Specialty , or Microsoft Certified: Security, Compliance, and Identity Fundamentals . Experience with scripting languages like Python, PowerShell, or Bash for automation and security tool integration. Familiarity with endpoint detection and response (EDR) tools. Understanding of DevSecOps practices and cloud-native security tools. What We Offer: A challenging and rewarding role focused on securing cutting-edge IT environments. Competitive salary and benefits package. Opportunities for growth and professional development in both security and infrastructure domains. If you are passionate about advancing your career in Security Operations while contributing to infrastructure management, we encourage you to apply! Join us in protecting and scaling secure IT environments for the future!
Posted 1 month ago
7 - 10 years
5 - 8 Lacs
Bengaluru
Work from Office
Project Role : Risk and Compliance Representative Project Role Description : Support service delivery through quality and risk management. Increase awareness of compliance policies and processes. Must have skills : Network Infrastructures Good to have skills : Network Security Operations, Network Analytics Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Global Network Services - Network Platforms - Service Assurance - Risk Management Lead.Job description.The GNS SA Risk Lead has the following primary responsibilities:CIONOW - on a weekly basis monitor the CIONOW dashboard for any reported vulnerabilities or patching requirements. This is for all in scope applications within the Network Platforms area.All identified vulnerabilities / patching updates are to be notified to the application POC for remediation.Mobile BitSight Monitoring & Remediation - The risk lead is responsible for monitoring and driving remediation of weekly identified incidents. These comprise of incidents where mobile devices accessing the internet are not obfuscated as per the set standard.Service Assurance Control Points- On a daily basis, monitor and remediate all in scope identified control points within the Network Portal. Currently there are 17 control points in scope. Some examples are: Missing or Incorrect building codes, missing OS version, missing Site Type, missing Country, missing serial number, missing region etc. Process Review, Improvement planning and implementation - Perform in depth process reviews of device configuration and device onboarding standards and cross reference them against the defined control points as mentioned above. Drive innovation and long-term strategic improvements to eliminate the need for the above defined control points. This is a high value add area that can significantly reduce resource efforts.Device Life Cycle Administration & Auditing - Twice per year perform an audit of all devices that do NOT have an EOVS (End of Vulnerability Support) date set in the Network Portal. The audit requires a review of vendor EOVS publications. Any new publication is to be entered against the relevant device model or OS Version within the Admin segment of the Network Portal.Guidance - All devices or OS versions that have reached EOVS are to have guidance defined using Architecture standards. Ensure all device owners have been notified by either reaching out to them directly or by notifying the Life Cycle Management team.Team management and delegation of all in scope tasks - as the Risk Lead it is your responsibility to manage, oversee and delegate all in scope tasks and duties. Ensure team tasks are handled in a timely and accurate manner. Track the performance of any team members and provide lead guidance on a regular basis. Qualifications 15 years full time education
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The security operations job market in India is growing rapidly as organizations increasingly prioritize cybersecurity to protect their data and systems from cyber threats. Security operations professionals play a crucial role in monitoring, analyzing, and responding to security incidents to ensure the security and integrity of an organization's IT infrastructure.
The average salary range for security operations professionals in India varies based on experience and qualifications. Entry-level positions can expect to earn between INR 4-6 lakhs per year, while experienced professionals with certifications and relevant experience can earn upwards of INR 10-15 lakhs per year.
A typical career progression in security operations may include roles such as Security Analyst, Security Engineer, Security Operations Manager, and Chief Information Security Officer (CISO).
In addition to expertise in security operations, professionals in this field are often expected to have skills in network security, incident response, threat intelligence, security information and event management (SIEM) tools, and knowledge of compliance regulations such as GDPR and ISO 27001.
As you explore opportunities in security operations in India, remember to continuously upskill, stay informed about the latest cybersecurity trends, and showcase your problem-solving abilities during interviews. With dedication and preparation, you can confidently pursue a rewarding career in this dynamic and in-demand field. Good luck!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
17069 Jobs | Dublin
Wipro
9221 Jobs | Bengaluru
EY
7581 Jobs | London
Amazon
5941 Jobs | Seattle,WA
Uplers
5895 Jobs | Ahmedabad
Accenture in India
5813 Jobs | Dublin 2
Oracle
5703 Jobs | Redwood City
IBM
5669 Jobs | Armonk
Capgemini
3478 Jobs | Paris,France
Tata Consultancy Services
3259 Jobs | Thane