Jobs
Interviews

1541 Security Operations Jobs - Page 28

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 10.0 years

20 - 25 Lacs

Thiruvananthapuram

Work from Office

Description Key Responsibilities: Advanced incident investigation: Conduct deep-dive investigations into complex security alerts and incidents, correlating events across multiple security tools and logs (SIEM, EDR, network logs, cloud logs). Incident response leadership: Lead containment, eradication, and recovery efforts for security incidents, collaborating with IT, engineering, and other teams. Threat hunting: Proactively search for threats within our environment using threat intelligence, hypotheses, and advanced analytical techniques. Root cause analysis: Perform root cause analysis for security incidents and recommend preventative measures to enhance our defenses. Threat Hunting: Exercises and proactive detection activities. Stay updated on emerging threats, vulnerabilities, attack techniques, and security news Vulnerability Management: Conduct regular vulnerability scans and assessments using industry-standard tools and ASPM. Analyze scan results to identify and classify security vulnerabilities, understanding their potential impact and exploitability. Develop playbooks: Contribute to the creation and refinement of incident response playbooks, runbooks, and standard operating procedures, including SOAR. Security tool optimization: Recommend and assist with the configuration, tuning, and optimization of SIEM rules, EDR policies, and other security controls. Threat intelligence integration: Integrate and operationalize threat intelligence (IOCs) and TTPs to improve detection capabilities and inform proactive defense strategies. Reporting: Generate comprehensive incident reports and provide actionable insights to management. Required Qualifications: Minimum of 5 years of experience in a Security Operations Center (SOC) or a similar cybersecurity role Strong understanding of security frameworks (MITRE ATT&CK, NIST, ISO 27001, etc.) Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel, etc.) Familiarity with EDR solutions (e.g., CrowdStrike, Carbon Black, Defender ATP) Solid knowledge of networking concepts, log analysis, and common attack vectors Experience in the incident response lifecycle, malware analysis, and threat hunting Ability to perform effectively in high-pressure situations and manage multiple incidents simultaneously Bachelor s degree in computer science, Information Security, or a related field (or equivalent experience) Preferred Skills and Certifications: Certifications such as GCIA, GCIH, CEH, CISSP, OSCP , or Security+ Experience with scripting (Python, PowerShell, Bash) for automation and log parsing Knowledge of cloud security monitoring (AWS, Azure, GCP) Experience with SOAR platforms and the automation of incident response workflows

Posted 1 month ago

Apply

2.0 - 6.0 years

1 - 4 Lacs

Pune

Work from Office

LOCATION : Pune DATE : 28 April 2025 JOB TYPE : FULL TIME Salary: 9-10L GSOC Supervisor Position Overview: The GSOC Supervisor will oversee the daily operations of the Global Security Operations Center and manage the GSOC Analysts, ensuring the effectiveness of 24/7 CCTV and alarm monitoring, incident reporting, and resolution. The candidate will be responsible for maintaining high standards of security operations and ensuring that all incidents are managed efficiently and effectively. Key Responsibilities Supervise and guide GSOC Analysts in their daily tasks, ensuring adherence to security protocols and procedures. Oversee the continuous monitoring of CCTV feeds and alarm systems to detect and respond to security incidents. Review and analyze incident reports, ensuring accuracy and completeness. Coordinate the response to security incidents, including communication with internal and external stakeholders. Develop and implement training programs for GSOC staff to enhance their skills and knowledge. Conduct regular performance evaluations of GSOC Analysts and provide feedback for improvement. Ensure all security equipment and systems are functioning correctly and report any issues for timely resolution. Prepare, maintain and update standard operating procedures (SOPs) for the GSOC operations. Provide leadership during critical incidents and ensure effective incident management and resolution. Stay informed about the latest security threats and trends and incorporate this knowledge into GSOC operations. Proficiency in using CCTV and alarm monitoring systems. Oversight of these functions by the Analysts. Proficient in drafting comprehensive global reports and travel advisories, ensuring clear communication and timely dissemination of critical information

Posted 1 month ago

Apply

4.0 - 10.0 years

7 - 11 Lacs

Bengaluru

Work from Office

As an IT Analyst for Vulnerability Management, you will be responsible to actively operate and continuously improve the service. The scope is worldwide, and you will work within a team of cybersecurity professionals in the Security Operations Center. You will identify, prioritize, assign, and track findings following the complete vulnerability lifecycle. You will act as escalation contact for external service delivery units as well as internal customers. With your help and expertise, the Vulnerability management service will evolve, empowering all stakeholders with the understanding to make informed choices and actions to resolve vulnerabilities. Ready to shape the future? This is your chance: You will be challenged to collaborate in strategy definition, and implementation plans in the team with the goal to reach next level cybersecurity. Responsibilities: Work with scanning tools to identify vulnerabilities Work with IT Service Management tools to address vulnerabilities and mitigations Support asset owners in understanding vulnerabilities and selecting appropriate remediation measures Regular reporting on vulnerability management topics Derive risk statements from vulnerabilities by contextualizing within company infrastructure Implement automations and continuously improve the automation process Stay up to date with current cybersecurity trends academic degree in Computer Sciences, IT or similar qualifications advanced understanding of the vulnerability management process experience in working with vulnerability management tools knowledge of automation

Posted 1 month ago

Apply

14.0 - 18.0 years

13 - 17 Lacs

Mumbai

Work from Office

Position Location Qualification Age Limit SOC Manager Mumbai Graduate / Post-Graduate Below 50 Experience / Role : - 14-18 yrs. experience IT Security or Infosec Required Skills : - Leadership: Proven ability to manage, mentor, and lead a team in a high-stakes, high-pressure environment. - Communication: Excellent communication and interpersonal skills, able to effectively report to senior leadership and collaborate with various teams. - Analytical Thinking: Strong analytical skills to assess complex security incidents and develop actionable solutions. - Attention to Detail: Ability to thoroughly investigate security incidents and ensure all aspects of an incident are documented and addressed. - Time Management: Excellent time-management skills and ability to prioritize tasks effectively, ensuring that critical incidents are addressed promptly. - Certification: Should be CISSP/CISM certification Job Description : - Leadership & Team Management: Lead and manage the SOC team, ensuring effective security monitoring, incident response, and operational management of security systems. - SOC Operations: Oversee 24/7 security monitoring and detection of security threats and incidents within the organizations network and infrastructure. - Incident Management: Manage the identification, containment, remediation, and escalation of security incidents. Coordinate response efforts across departments to mitigate potential risks. - Security Tool Management: Oversee the configuration, tuning, and management of security monitoring tools (e.g., SIEM, Proxies, PAM, firewalls, endpoint protection etc). Ensure proper functioning of all security tools, and optimize their performance for better detection and response. - Threat Intelligence & Analysis: Utilize advanced threat intelligence tools to monitor and evaluate emerging threats. Collaborate with internal and external teams to implement countermeasures. - Process Improvement & Automation: Continuously improve and automate SOC processes to enhance the efficiency and effectiveness of security operations, leveraging SOAR tools and technologies. - Collaboration with Other Teams: Work closely with IT, Application, and Network teams to ensure a unified approach to cybersecurity and incident management. - Reporting & Metrics: Develop, track, and report SOC performance metrics, including response times, incident resolution, and overall SOC health. - Compliance & Risk Management: Ensure that the SOC operations comply with industry standards, regulatory requirements, and internal policies, including NIST, ISO 27001, and SEBI. - Security Posture Enhancement: Contribute to strengthening the organization s overall security posture by recommending new technologies, processes, and methodologies to enhance SOC capabilities. - Training & Development: Lead ongoing training initiatives for SOC analysts and staff to enhance their skills and awareness of the latest cybersecurity threats and techniques. Please email your resume, mentioning the position applied for in the subject column at : careers@cdslindia.com

Posted 1 month ago

Apply

9.0 - 12.0 years

14 - 18 Lacs

Hyderabad

Work from Office

Senior Software Engineer (Java, Cloud) Experience : 9 to 12 years Location : Hyderabad / Trivandrum / Kochi / Bangalore / Chennai Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence About the role We are looking for an experienced Senior Software Engineer to lead the product design and architecture for our enterprise SaaS platform. You will design, develop, and optimize, our Security-as-Code product, including key features and functionality. You will be responsible for deploying and debugging cloud stacks, educating teams on new cloud initiatives, and ensuring the security of the cloud infrastructure. To be successful as a Sr. S/W Engineer, you should be able to envision, design, and develop cloud-based solutions and maintain cloud infrastructures in accordance with best practices and company security policies. The ideal candidate should have excellent troubleshooting skills, stay current with industry trends, and should be a team player. Responsibilities: Create and deliver world class enterprise software Design, develop and deploy modern cloud native solutions Collaborate with product, engineering, and QA teams Interact with customers and developers as needed Educate teams on the implementation of new cloud technologies and initiatives Define, develop, and maintain cloud security best practices Identify, analyze, and resolve infrastructure vulnerabilities and application deployment issues Regularly review existing systems and make recommendations for improvements Requirements: Degree in computer science or a similar field At least 5 years of software engineering experience Experience with CI/CD systems Experience with DevOps, Scrum, and Kanban Experience with Azure, AWS, and GCP Troubleshooting and analytical skills Good communication and collaboration skills

Posted 1 month ago

Apply

5.0 - 10.0 years

9 - 13 Lacs

Thiruvananthapuram

Work from Office

Description Key Responsibilities: Advanced incident investigation: Conduct deep-dive investigations into complex security alerts and incidents, correlating events across multiple security tools and logs (SIEM, EDR, network logs, cloud logs). Incident response leadership: Lead containment, eradication, and recovery efforts for security incidents, collaborating with IT, engineering, and other teams. Threat hunting: Proactively search for threats within our environment using threat intelligence, hypotheses, and advanced analytical techniques. Root cause analysis: Perform root cause analysis for security incidents and recommend preventative measures to enhance our defenses. Threat Hunting: Exercises and proactive detection activities. Stay updated on emerging threats, vulnerabilities, attack techniques, and security news Vulnerability Management: Conduct regular vulnerability scans and assessments using industry-standard tools and ASPM. Analyze scan results to identify and classify security vulnerabilities, understanding their potential impact and exploitability. Develop playbooks: Contribute to the creation and refinement of incident response playbooks, runbooks, and standard operating procedures, including SOAR. Security tool optimization: Recommend and assist with the configuration, tuning, and optimization of SIEM rules, EDR policies, and other security controls. Threat intelligence integration: Integrate and operationalize threat intelligence (IOCs) and TTPs to improve detection capabilities and inform proactive defense strategies. Reporting: Generate comprehensive incident reports and provide actionable insights to management. Required Qualifications: Minimum of 5 years of experience in a Security Operations Center (SOC) or a similar cybersecurity role Strong understanding of security frameworks (MITRE ATT&CK, NIST, ISO 27001, etc.) Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel, etc.) Familiarity with EDR solutions (e.g., CrowdStrike, Carbon Black, Defender ATP) Solid knowledge of networking concepts, log analysis, and common attack vectors Experience in the incident response lifecycle, malware analysis, and threat hunting Ability to perform effectively in high-pressure situations and manage multiple incidents simultaneously Bachelor s degree in computer science, Information Security, or a related field (or equivalent experience) Preferred Skills and Certifications: Certifications such as GCIA, GCIH, CEH, CISSP, OSCP , or Security+ Experience with scripting (Python, PowerShell, Bash) for automation and log parsing Knowledge of cloud security monitoring (AWS, Azure, GCP) Experience with SOAR platforms and the automation of incident response workflows

Posted 1 month ago

Apply

8.0 - 14.0 years

15 - 19 Lacs

Noida

Work from Office

Head of Security TReDS Full-time | Senior Leadership Role Experience - 8-14 years Location: Noida (Hybrid) About C2Treds C2Treds is an RBI-approved TReDS platform, of C2FO the world s leading on-demand working capital platform. Our mission is clear: to empower every MSME in India with the working capital they need to thrive, driving long-term sustainability and economic growth. At C2Treds, a strategic initiative by C2FO, we are transforming the landscape for MSMEs in India by unlocking easier access to working capital. As India s only fintech platform offering both Early Pay and TReDS functionalities, we enable businesses to bypass receivables delays, enhance financial agility, and unleash their full growth potential. We understand that MSMEs are the backbone of India s economy, contributing to 30% of the country s jobs. Yet, these businesses often face significant barriers like restrictive debt cycles, high interest rates, and delayed payments that stifle their growth potential. That s where C2Treds comes in with over 50,000 MSMEs in C2FO s India network, we are dedicated to breaking down these financial barriers and providing a direct path to success. By joining C2Treds, you ll be part of an innovative, growth-driven company at the forefront of transforming MSME financial empowerment and shaping India s economic future. As the Head of Security, you will be the strategic architect and operational guardian of TReDS information security landscape. You ll lead the design, execution, and management of robust security initiatives to safeguard the platform s data, systems, and networks ensuring resilience in a regulated and rapidly evolving fintech ecosystem. Key Responsibilities Design and execute a holistic information security strategy that aligns with TReDS business goals and complies with relevant regulatory mandates. Lead comprehensive risk assessments and vulnerability scans to proactively identify and address security threats. Develop and enforce information security policies, standards, and protocols to minimize risk and protect sensitive data. Oversee daily security operations and ensure rigorous adherence to security policies and procedures across the TReDS platform. Spearhead incident response efforts, coordinating with stakeholders to swiftly contain, investigate, and mitigate security breaches. Direct real-time monitoring and threat detection through security systems and tools, enabling rapid response to potential intrusions. Ensure organizational compliance with all applicable industry standards, legal requirements, and regulatory frameworks. Conduct regular audits and security assessments to uncover and resolve compliance gaps. Collaborate with cross-functional teams to embed security best practices into business processes. Lead identification, evaluation, and mitigation of security risks tied to operations, technology infrastructure, and third-party relationships. Develop and operationalize a dynamic risk management framework that prioritizes and addresses key threats. Assess and manage security risks associated with external vendors and partners, ensuring adherence to TReDS security benchmarks. Champion a security-first mindset across the organization, mentoring team members and promoting a culture of accountability, awareness, and excellence. Required Qualifications Bachelor s degree in Computer Science, Information Security, or a related discipline. Recognized certifications such as CISSP, CISM, or CISA. Minimum 6 years of experience in leading information security teams. In-depth knowledge of security frameworks and standards, especially those relevant to the Indian financial sector. Demonstrated success in building and executing enterprise-grade security programs. Strong leadership, interpersonal, and communication skills. Ability to thrive in fast-paced, high-stakes environments. Familiarity with cloud security principles and data privacy regulations. Preferred Qualifications Prior experience in the fintech domain. Knowledge of Indian data privacy regulations, including the Personal Data Protection Bill. Commitment To Diversity And Inclusion As an Equal Opportunity Employer, we not only value diversity and equality, but we also empower our team members to bring their authentic selves to work every day. Our goal is to create a workplace that reflects the communities we serve and our global, multicultural clients. We recognize the power of inclusion, emphasizing that each team member was chosen for their unique ability to contribute to the overall success of our mission. #LI-NS

Posted 1 month ago

Apply

3.0 - 6.0 years

3 - 4 Lacs

Pune

Work from Office

Conduct routine quality checks and inspections of raw materials, in-process items, and finished products to ensure compliance with established standards Assist in documenting test results, maintaining quality records, and reporting deviations Support senior QC staff in calibrating instruments, preparing samples, and implementing corrective actions Ensure adherence to GMP and safety regulations in the lab and production areas Collaborate with production teams to resolve quality-related issues promptly and help in continuous improvement of quality processe

Posted 1 month ago

Apply

2.0 - 5.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Senior System Engineer Join Connectivity Enablers team recognized for leadership, innovation and diversity. About the Connectivity Enablers The Aircraft Date Gateway routers are avionics networking computers, built to provide Cyber industrial-class security and connectivity to the aircraft. The securely connected platform enhances wireless connectivity, network domain switching, routing and Cyber security operations. ADGs ensure ready to send Avionics data to Honeywell Sentience Cloud. ADGs encompass Connectivity, Computation and Storage capabilities: SATCOM, 4G LTE Air-To-Ground connectivity links throughout the world; and 802. 11ac WiFi for connectivity to passengers, crew, pilot and ground operations. The ADG also supports routing for both wireless and wired network connections and has an internal L2-managed Gigabit Ethernet Switch. The ADG includes other important Avionics interfaces such as ARINC 429, ASCB, AFDX, and aircraft discrete I/O and USB ports. ADG provides edge computing facility, for minimizing the response time, the power consumption, and the bandwidth cost, to deliver functionality such as big data collection, management, real-time communication, expandable peripherals, and various other services. YOU MUST HAVE Bachelors Degree in Engineering (Electrical/Systems/Computer) Minimum 8+ years of engineering experience WE VALUE Knowledge of the systems development lifecycle and software development lifecycle Experience in systems engineering - system requirement, integration, and verification (DO-178C) Worked on Cyber security Compliance and exposure to meet DO-356A for DAL-D products Experience with Linux environment-based testing, scripting such as Python. Experience in test automation tool such as ROBO framework Linux Environment, Linux Networking Stack, SE Linux, Linux Firewall settings, Docker containers. YOU MUST HAVE Bachelors Degree in Engineering (Electrical/Systems/Computer) Minimum 8+ years of engineering experience WE VALUE Knowledge of the systems development lifecycle and software development lifecycle Experience in systems engineering - system requirement, integration, and verification (DO-178C) Worked on Cyber security Compliance and exposure to meet DO-356A for DAL-D products Experience with Linux environment-based testing, scripting such as Python. Experience in test automation tool such as ROBO framework Linux Environment, Linux Networking Stack, SE Linux, Linux Firewall settings, Docker containers. Job Responsibilities include the following: Requirements analysis, Authoring. Systems validation & verification- Prepare detailed test plans, provide test coverage, analyze test data and report test results. Systems integration Build reusable code and libraries for future use Clearly articulate key performance and operability results within Honeywell and with external customers. Excellent communication and problem-solving skills Should possess excellent soft skills to work and deliver in an agile environment. Constantly look to automate manual and repetitive tasks while reducing or optimizing build/release times. Automate and implement the Continuous Integration and Continuous Deployment pipeline. Engage with teams and manage build requirements. Troubleshoot and debug on the issues reported on the feature and functionality. Job Responsibilities include the following: Requirements analysis, Authoring. Systems validation & verification- Prepare detailed test plans, provide test coverage, analyze test data and report test results. Systems integration Build reusable code and libraries for future use Clearly articulate key performance and operability results within Honeywell and with external customers. Excellent communication and problem-solving skills Should possess excellent soft skills to work and deliver in an agile environment. Constantly look to automate manual and repetitive tasks while reducing or optimizing build/release times. Automate and implement the Continuous Integration and Continuous Deployment pipeline. Engage with teams and manage build requirements. Troubleshoot and debug on the issues reported on the feature and functionality.

Posted 1 month ago

Apply

10.0 - 15.0 years

12 - 17 Lacs

Gurugram

Work from Office

Company: MMC Corporate Description: We are seeking a talented individual to join our GIS Team at MMC Corporate This role will be based in Gurgaon. This is a hybrid role that has a requirement of working at least three days a week in the office. Associate Director - Cyber Security Risk Vulnerability Scoring What can you expect To oversee and manage the Cybersecurity Risk Adjusted Vulnerability Scoring (RAVS) Program. This enterprise-level initiative is critical to transforming the measurement, prioritization, and response to cybersecurity vulnerabilities by leveraging integrated systems, threat intelligence, and contextual organizational data We will count on you to: Program Oversight 1. Lead the development, implementation, and ongoing management of the enterprise RAVS program.2. Integrate data form vulnerability scanners, CMDB, threat intel feeds, cybersecurity systems, and internal business systems to generate dynamic risk adjusted vulnerability scores.3. Collaborate with internal teams across cybersecurity, IT, risk, business units, data analytics to continuously refine RAVS logic and scoring models.4. Develop operational playbook and prioritization framework that aligns vulnerabilities response to true business risk. RAVS Day-to- Day Operations and Risk Management 1. Monitor, triage, and escalate enterprise vulnerabilities based on RAVS output and threat indicators. 2. Provide real-time situational awareness and technical direction during vulnerability-related incidents and assessments. 3. Ensure integration and alignment between RAVS and enterprise vulnerability management platforms, SIEM, SOAR, threat intel, and cloud security tools. 4. Track remediation efforts, metrics, SLAs & SLOs adherence, and risk decisions.5. Generate executive-level dashboards and reports to communicate vulnerability risk posture and trends. Platform Management 1. Oversee functionality and data quality for critical systems. 2. Managing the operational health and data flows between vulnerability detection system, threat intelligence sources, asset inventories, and risk engines. 3. Ensuring business context and asset criticality are mapped into RAVS platform to support accurate risk prioritization. 4. Cross coloration with detection engineering and VMED to maintain score calculation logic, rule sets, and automation flows. 5. Maintaining process documentation, operational runbooks, and continuous improvement workflows for all integrated components. Leadership and Collaboration 1. Cross Functional CollaborationSupport and collaborate with development, business CISOs, operations, and cloud teams across the enterprise to ensure effective vulnerability management practices. 2. Support VMED with various project-based initiatives (creation of KPIs, onboarding of new tools, etc.).3. Drive ongoing assessments of RAVS programs effectiveness, identify areas for tuning, optimization, or automation. 4. Collaborate with governance, risk, and compliance teams to align scoring outcomes with organizational risk thresholds and reporting needs.5. Lead training and onboarding of cross-functional stakeholders who interact with RAVS platform and outputs.6. Partner with Security Operations and other Detection & Response Teams (DART) to embed RAVS data into incident response and remediation workflows.7. Support audit and regulatory readiness activities by ensuring RAVS processes and records meet enterprise and compliance standards. What you need to have: Security Cloud ToolsAssist with the evaluation and selection of vulnerability management tools that integrate seamlessly with various cloud environments and provide fine granular access controls and CMDB attributers such as asset ownership. IntegrationIntegrate the security cloud tools with other security tools and systems, including the SIEM solutions, change ticketing systems, etc Launch awareness campaigns to promote secure practices and vulnerability management, emphasizing the unique challenges of cloud environments. CISSP, CISM, AWS Certified Security Specialist, or similar advanced cloud security certifications preferred. What makes you stand out 10+ Years Experience in Vulnerability Management, incident response, cloud security, or cybersecurity related fields, with at least 3 years experience in a senior technical role. Why join our team: We help you be your best through professional development opportunities, interesting work and supportive leaders. We foster a vibrant and inclusive culture where you can work with talented colleagues to create new solutions and have impact for colleagues, clients and communities. Our scale enables us to provide a range of career opportunities, as well as benefits and rewards to enhance your well-being. Marsh McLennan(NYSEMMC) is the worlds leading professional services firm in the areas ofrisk, strategy and people. The Companys more than 85,000 colleagues advise clients in over 130 countries.With annual revenue of $23 billion, Marsh McLennan helps clients navigate an increasingly dynamic and complex environment through four market-leading businesses.Marshprovides data-driven risk advisory services and insurance solutions to commercial and consumer clients.Guy Carpenter develops advanced risk, reinsurance and capital strategies that help clients grow profitably and pursue emerging opportunities. Mercer delivers advice and technology-driven solutions that help organizations redefine the world of work, reshape retirement and investment outcomes, and unlock health and well being for a changing workforce. Oliver Wymanserves as a critical strategic, economic and brand advisor to private sector and governmental clients. For more information, visit marshmclennan.com, or follow us onLinkedInandX. Marsh McLennan is committed to embracing a diverse, inclusive and flexible work environment. We aim to attract and retain the best people and embrace diversity of age, background, caste, disability, ethnic origin, family duties, gender orientation or expression, gender reassignment, marital status, nationality, parental status, personal or social status, political affiliation, race, religion and beliefs, sex/gender, sexual orientation or expression, skin color, or any other characteristic protected by applicable law. Marsh McLennan is committed to hybrid work, which includes the flexibility of working remotely and the collaboration, connections and professional development benefits of working together in the office. All Marsh McLennan colleagues are expected to be in their local office or working onsite with clients at least three days per week. Office-based teams will identify at least one anchor day per week on which their full team will be together in person Attachments Marsh McLennan (NYSEMMC) is a global leader in risk, strategy and people, advising clients in 130 countries across four businessesMarsh, Guy Carpenter, Mercer and Oliver Wyman. With annual revenue of $24 billion and more than 90,000 colleagues, Marsh McLennan helps build the confidence to thrive through the power of perspective. For more information, visit marshmclennan.com, or follow on LinkedIn and X. Marsh McLennan is committed to embracing a diverse, inclusive and flexible work environment. We aim to attract and retain the best people and embrace diversity of age, background, caste, disability, ethnic origin, family duties, gender orientation or expression, gender reassignment, marital status, nationality, parental status, personal or social status, political affiliation, race, religion and beliefs, sex/gender, sexual orientation or expression, skin color, or any other characteristic protected by applicable law. Marsh McLennan is committed to hybrid work, which includes the flexibility of working remotely and the collaboration, connections and professional development benefits of working together in the office. All Marsh McLennan colleagues are expected to be in their local office or working onsite with clients at least three days per week. Office-based teams will identify at least one anchor day per week on which their full team will be together in person.

Posted 1 month ago

Apply

10.0 - 20.0 years

25 - 40 Lacs

Bangalore Rural, Bengaluru

Work from Office

Payroll Company: AKAL INFORMATION SYSTEM LTD Department: - Unique Identification Authority of India - UIDAI Position: Senior Security Manager Location: Tech Centre, Bangalore Education: B.E/B.Tech/ M.Sc Computers/M.Sc IT/MCA Certifications (anyone is mandatory) - CISSP/ CISM/CCSP Experience - 10 years of work experience in the Cyber Security/ Security Operation Centre/ Network Security/ Cloud Security. Experienced in management of security operations and security organization. Experienced in managing external audits Experienced in facing clients, internal stakeholders and managing teams. Ability to develop solution architecture designs Good understanding of Cloud Security and Control Matrix Experienced in drafting and implementing policy, procedures, and standards Should have knowledge on information security standard like ISO27001 and other cyber security standards In-depth knowledge of security concepts such as cyberattacks and techniques, threat vectors, risk management etc. Experienced in driving security projects. Job Profile - Research emerging threats, publicly disclosed vulnerabilities or attack vectors and proactively push mitigating controls to services maintain proficient knowledge of organisation controls, roadmap and service architecture oversees cloud security assessment and posture management. Credible team management and project management capabilities. Improve the perimeter defence solutions in the environment as per agreed architecture with the following solutions: Firewall, Web Gateway, Cloud Security, WAF, NIPS etc. Provide strategic directions to SOC team and organization for security posture improvements Manage centralized incident response management, continuous and proactive monitoring, and preventative maintenance. Oversee deployment and promote continuous improvement of Security. Operations & Threat Management processes, technologies, automations and integrations Research emerging threats, publicly disclosed vulnerabilities or attack vectors and proactively push mitigating controls to services Maintain proficient knowledge of Organization's controls, roadmap, and service architecture Oversee Cloud Security assessment and Posture management. Prepare and deliver meaningful metrics representative of the Security Operations and Threat Management programs Improve implementation of security processes in compliance with ISO27001, Aadhaar Act and IT act Provide technical security expertise to other departments with the organization, including IT, Software development and operation teams Develop strong relationships with external audit and key stakeholders to ensure risk management oversight is understood, managed appropriately and current with all standards, guidelines, and regulations that are applicable Release information security metrics to stakeholders reporting compliance levels. Perform any other related duties as required or assigned. We

Posted 1 month ago

Apply

0.0 - 1.0 years

30 - 35 Lacs

Bengaluru

Work from Office

: Job Title: Collateral Management LocationBangalore, India Corporate TitleAVP Role Description Collateral Managements principal function is risk mitigation, covering all currency, equity, rates and credit derivatives as well as FX, repo and commodity products traded across the world. The Collateral Teams primary role is to aggregate and manage the banks exposure across its entire collateralized portfolio. The implementation of our effective collateral management agreements with our clients has dramatically reduced the amount of credit risk associated with a transaction. Our successful collateral management program lowers the banks credit line utilization and significantly reduces regulatory capital charges, which in turn leads to greater trading capacities and higher returns on capital. The team is responsible for monitoring the feeds & uploading / processing various trades feeds into the Collateral Systems to enable smooth & timely functioning of the various downstream functionalities. Pricing of securities held as collateral, performing reconciliation between various systems. Static data setup for new clients and maintenance of static data. What well offer you 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities Working in a team performing the following functions: Uploading trades into the Collateral System. Monitoring of feeds from various source systems. Reporting breaks to the senior management in terms of missing MTM, large swings in the MTM as compared to previous day & likes. Escalation to IT, BAC (Business Area Control), Support teams to ensure timely resolution of discrepancies encountered. Security pricing to ensure correct collateral valuation. Performing reconciliation between various books of accounts, reporting and investigation of breaks. Agreement/Static data setups in Collateral Systems on the basis of executed ISDA, CSA documents. Data maintenance tasks. Adherence to TAT is of utmost importance. Handling of various projects initiated by Deutsche Bank & maintaining a progress charter for the same. Internal clients including, Margin Managers, Project Stakeholders, Valuations, IT & BAC. Your skills and experience Team Player. Strong communication skills. Fluency in Microsoft Office Should be open to working in shifts. Ability to understand the working of Derivative Products & related concepts. Analytical and problem solving skills essential. Good with numbers & logical reasoning. 0 1 years of operations experience, preferably in collateral management or Derivative Ops or Risk management or Security Operations How well support you About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htm

Posted 1 month ago

Apply

4.0 - 10.0 years

8 - 12 Lacs

Bengaluru

Work from Office

As an IT Analyst for Vulnerability Management, you will be responsible to actively operate and continuously improve the service. The scope is worldwide, and you will work within a team of cybersecurity professionals in the Security Operations Center. You will identify, prioritize, assign, and track findings following the complete vulnerability lifecycle. You will act as escalation contact for external service delivery units as well as internal customers. With your help and expertise, the Vulnerability management service will evolve, empowering all stakeholders with the understanding to make informed choices and actions to resolve vulnerabilities. Ready to shape the future? This is your chance: You will be challenged to collaborate in strategy definition, and implementation plans in the team with the goal to reach next level cybersecurity. Responsibilities: Work with scanning tools to identify vulnerabilities Work with IT Service Management tools to address vulnerabilities and mitigations Support asset owners in understanding vulnerabilities and selecting appropriate remediation measures Regular reporting on vulnerability management topics Derive risk statements from vulnerabilities by contextualizing within company infrastructure Implement automations and continuously improve the automation process Stay up to date with current cybersecurity trends academic degree in Computer Sciences, IT or similar qualifications advanced understanding of the vulnerability management process experience in working with vulnerability management tools knowledge of automation

Posted 1 month ago

Apply

4.0 - 7.0 years

7 - 11 Lacs

Bengaluru

Work from Office

The Information Security Engineer II position operates in a support role implementing security, technology and innovation in the Global Security Operations Center (GSOC) environment. The Info Security Engineer II is virtually the same as Info Security Engineer I but is a promotion path for individuals that have been in the role for 5-7 years. The centers operate 24x7x365. The GSOC is a pivotal function in the Global Security organization responsible for operation, maintenance, and monitoring of the Managed Security portfolio. This function facilitates the ingress, implementation and egress of advanced client trouble / change requests for DDoS mitigation and Threat Intelligence products as well as active monitoring/response to DDoS alerts/events. The Information Security Engineer II is expected to perform in an advanced capacity, including escalation support and on-call. Provides mentoring, training and escalation support to front line SOC personnel. Principal GSOC Duties and Responsibilities (Essential Functions) : Perform basic to moderate changes within the managed security environment Manage and resolve customer faults, service outage and impairment events Monitor, triage and response to security alerts for client security events. Investigation and resolution of impairment scenarios on Managed Security products. Mentor and train peers in the Security Operations environment Research and implement customer generated change requests for Managed Security products Generate incident cases and escalate to superordinate teams in accordance with time and severity-based SLA’s Possess exceptional customer service skills Multi-task during events Communicate effectively with managers, customers and vendors Maintain solid working relationships, including collaborative technical activities with peers Develop relationships with other teams both within and outside of Security to enhance customer experience Strong written and verbal communication skills Analytical and problem-solving skills Attention to detail with good organizational capabilities Prioritize with good time management skills Qualifications & Skills: Required (education / experience / skills / competencies) Requires Bachelor’s degree in related field plus 2 years relevant experience or equivalent combination of education and experience. Preferred 4-5 years in a Security Operations environment Demonstrated understanding of Denial-of-Service concepts and attack vectors, mitigation options Demonstrated proficiency in routing and networking skills, including the ability to: Troubleshoot BGP and BGP community strings Review and analyze packet captures Demonstrated proficiency in configuring Access control Lists Certifications In specific security technologies such as Fortinet, Arbor, Radware, Palo Alto, Cisco or Checkpoint. Security industry certifications (examples): o CISSP o CRISC o CISM o Security o CCNA o ACIA o CCNA o CEH o ITIL Foundations Advanced knowledge and skills of at least one programming language (python preferred) Mandatory Skills Managed security services experience, Firewalls like Palo Alto & Fortinet, DDos Operations, Trend Micro Deep Security IPS/IDS,SLM, Radware, DDOS, Arbor, Splunk, Zabbix, Network security and Incident Management, Certifications, such as GCIH / CISSP / CEH / CISM, Client Interfacing, Strong Analytical and Compliance skills "We are an equal opportunity employer committed to fair and ethical hiring practices. We do not charge any fees or accept any form of payment from candidates at any stage of the recruitment process. If anyone claims to offer employment opportunities in our company in exchange for money or any other benefit, please treat it as fraudulent and report it immediately."

Posted 1 month ago

Apply

2.0 - 5.0 years

4 - 7 Lacs

Ranchi

Work from Office

We are looking for a highly skilled and experienced IC&Q Executive to join our team in Ranchi. The ideal candidate will have 2-5 years of experience in the banking or financial services industry. Roles and Responsibility Conduct scheduled and surprise visits for 8 branches as per the schedule provided by the Head Office. Gather market intelligence on MFI business in the area and maintain records of collection quality in the catchment and advise branches of caution areas. Support field teams in difficult cases of collections and conduct investigations into special situations if needed. Maintain accurate records of all activities and provide regular updates to the Head Office. Collaborate with internal stakeholders to resolve issues and improve overall performance. Analyze data and provide insights to enhance business outcomes. Job Graduate or Post Graduate in any discipline. Strong understanding of banking or financial services operations. Excellent communication and interpersonal skills. Ability to work independently and as part of a team. Strong analytical and problem-solving skills. Familiarity with regulatory requirements and compliance. TitleIC&Q - Executive - MFB - Ranchi - Satya Ganga Arcade - J-Grades, ref=6588142.

Posted 1 month ago

Apply

1.0 - 3.0 years

4 - 8 Lacs

Karnal

Work from Office

We are looking for a highly skilled and experienced Audit Executive to join our team in Karnal. The ideal candidate will have 1-3 years of experience in auditing or a related field. Roles and Responsibility Conduct scheduled and surprise visits for 8 branches as per the schedule provided by the head office. Gather market intelligence on MFI business in the area and maintain records of collection quality. Support field teams in difficult cases of collections and conduct investigations into special situations if needed. Maintain accurate records of audit findings and provide recommendations for improvement. Collaborate with internal stakeholders to ensure compliance with regulatory requirements. Develop and implement effective audit plans to identify areas of improvement. Job Graduate/Post Graduate in any discipline. Strong knowledge of auditing principles and practices. Excellent communication and interpersonal skills. Ability to work independently and as part of a team. Strong analytical and problem-solving skills. Familiarity with financial services industry regulations and standards. TitleAudit Executive - IC&Q - MFB - Karnal - Part 1 - J Grades, ref=6588677.

Posted 1 month ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Bengaluru

Work from Office

What this job involves Duty Manager, Facilities will be responsible for managing all aspects of day to day service delivery in Accenture during the shift. He/ She also will be accountable for proper usage and functionality of the technologies implement at site Responsibilities Helpdesk/Mailroom Operations To provide management advice on Helpdesk/Mailroom for escalated issues during the shift To ensure immediate response to all priority calls from employees and Siebel team during the shift and follow escalation process Clearing of C-mail / Government agencies mail to the proper recipient. To ensure accident or crises management is addressed immediately Front Office Operations To provide management advice for Front Office for escalated issues during the shift. To ensure immediate response to all priority calls during the shift and follow escalation process To take rounds of front office, lobby area, rest rooms to ensure a high standard of housekeeping & upkeep Security Operations Attending the shift briefing To ensure Security muster, deployment and make sure to acknowledge on the register for any penalties/comments for the improvement in security services To ensure that the security assignment manager or security in-charge of the facility is being updated on the clients/VIP visits To ensure that the security related issues are discussed with security assignment manager and also on priority for the shift and ensure there is an action and tracking for the issue closure. To ensure that security staff adheres to GAP norms. To discuss and assist facility manager and security Manager (pan India) on monthly basis on the vendor performance matrix. To ensure the Grooming of the staff To manage the overall key room, clock room and time office operations. To ensure weekly training is imparted and staff grooming standard is maintained. To ensure VMT tool (vendor management tool) is up and run all the time To ensure all registers/tools update for material movements (In & Out) on day to day basis Follow the escalation matrix if anything wrong Ensure to implement EHS practices (PPEs etc) in and around the security premises Ensure to update the new assets in the asset tracker & update the relevant stake holders (WM & CEs) Housekeeping Operations Attending the shift briefing To ensure Housekeeping muster, deployment and ensure acknowledgment on the register for and penalties/comments for the improvement in housekeeping services. To ensure that the housekeeping duty manager or housekeeping in-charge of the facility is being updated on the clients/VIP visits. To ensure that the housekeeping related issues are discussed with housekeeping duty manager and also on priority for the shift and ensure there is an action and tracking for the issue closure. To ensure a facility walk through to check on all rest rooms, breakout area, workstations, meeting rooms, cabins, common areas, development areas for the quality of the housekeeping services. Identification, on time closure and reporting of snags. To discuss and assist facility manager on monthly basis on the vendor performance matrix. Ensure all the Siebel housekeeping calls are closed on priority and within TAT without escalations. Cafeteria Operations To ensure caterers maintain a high standard of hygiene & cleanliness in the services areas During food run out situation, ensure the matter is escalated to catering lead and coordinate with the catering vendor or any other alternative arrangements To ensure random food samples test is done by Accenture authorized vendor and results are taken up accordingly. To manage and supervise the quality, quantity and the cost of meal and refreshments being served in the cafeteria. To ensure that the operating hours, menus will be prominently displayed in all prominent places in the cafeteria. To conduct quarterly traffic analysis and ensure that waiting time on the cash counter and food counters and Sodexho counters shall be within tolerable limits. To ensure that the table & chairs are cleaned at all times and the frequency shall be modulated according to the traffic. To ensure that tracking is done on the vendor crockery like spoons, plates etc. to ensure no shortages. Should conduct monthly random Kitchen audit of the vendors. Escalate Facility Manager and then Accenture Lead on escalations. Ensure the hygiene of the cafeteria vendors operating in stalls. Ensure PPE are used by vendor staff while serving, cooking and washing. Estate Management Ensure necessary approvals are taken by the builder team on cases to cases basis during specific events Coordination with builder on guarding services and common area upkeep daily / weekly / monthly Co-ordinate with builder security for logistics requirement Co-ordinate with builder for pest control activity closure Take proper rounds in all common areas maintained by builder Co-ordination with builder HK team & ensure daily HK activity in place in common areas Make snag reports pertaining to common areas and follow up for closure Coordination for bee hive removals and pest control Coordination with builder security team for any logistics requirement General Operations To ensure upkeep of breakout area & reprographic equipments at all times and take necessary actions as required. To ensure all such communication is entered in the duty manager log book to inform the next shift person. Proper handing over and taking over to be done. To go for facility, walk around and ensure Walk around map & Guide is followed and maintained. To adhere to Accenture Policies, Processes & procedures and also the statutory documents To adhere to Accenture SLA & KPI as agreed with JLL To assist Facility Manager in all such ISO, Internal, External, audits that happen at Accenture and ensure necessary documentation are done To coordinate with engineering team for any issues that need help. Organizing induction program for all TPV & Jll staff Plan & train TPV staff on Accenture policies and requirements. Daily and monthly updating of OLA in the SMDRS tool. Important and VIP client visits to be coordinated with Events team and should be managed without escalations. Should have complete knowledge & functionality e.Fit tools ( VMT, IMT, Site Ops. Site Inspection tool), BGC and work permit tool. Should govern overall pest control, carpet maintenance, Wellness room, Ambulance, Indoor plants, Recreation room and Gym activities. Should conduct all the scheduled meeting and focus meets with projects as per calendar. Should participate and manage half yearly fire drill. All daily, weekly and monthly reports to be shared on time. All the relevant checklist to be governed and maintained as per requirement. Adopt to all the new implemented initiatives. Handling of security, EHS incidents on priority and communicating the same as per escalation matrix. Answering the employee query on phone and replying mails Follow the escalation process & matrix for any incident / issues (100%) Sound like the job youre looking for Before you apply, its also worth knowing what we are looking for: Education and experience Graduate degree with relevant work experience. Very Good people skills and ability to interact with a wide range of client staff and demands; Proven ability to function effectively as part of a team Proven ability to initiate and follow through with improvement initiatives. What you can expect from us Youll join an entrepreneurial, inclusive culture. One where we succeed together across the desk and around the globe. Where like-minded people work naturally together to achieve great things.

Posted 1 month ago

Apply

1.0 - 3.0 years

3 - 7 Lacs

Bengaluru

Work from Office

We are looking for a highly skilled and experienced SOC Analyst to join our team at Apptad Technologies Pvt Ltd. The ideal candidate will have 1 to 3 years of experience in the field. Roles and Responsibility Monitor security systems to identify potential threats. Analyze and investigate security incidents to determine their nature and scope. Create ITSM tickets for true positives and escalate them to next-level support as needed. Take remediation steps based on access level, such as Proofpoint, server firewall, active directory, and DNS proxy. Document steps taken for reporting and tracking purposes. Update users on actions taken regarding specific tools. Job Minimum 1 year of experience in security operations or a related field. Strong understanding of security principles and practices. Ability to work effectively in a fast-paced environment with multiple priorities. Excellent analytical and problem-solving skills. Strong communication and documentation skills. Familiarity with ITSM ticketing systems and escalation procedures.

Posted 1 month ago

Apply

7.0 - 12.0 years

5 - 10 Lacs

Bengaluru

Work from Office

Telesales & Inside Sales Careers | Denave Job Details Date : 26 Jun, 2025 Job description The ideal candidate should have a strong background in lead generation, demonstrating the ability to identify and nurture potential business opportunities effectively. They must be an experienced B2B salesperson with excellent communication skills and the confidence to engage with stakeholders across all organizational levels. Prior experience in selling cybersecurity products, IT solutions, or related services is highly desirable. Experience Essential 1. Cybersecurity Industry Knowledge (Beneficial): A foundational understanding of the cybersecurity landscape, common threats, and solutions can be a significant advantage. 2. Understanding of Palo Alto Networks Offerings: BDRs should understand Palo Alto Networks products, services, and value propositions across areas like network security, cloud security, and security operations. Job Responsibilities 1. Sales or Business Development Experience: Previous experience in a BDR, Sales Development Representative (SDR), or similar role is highly desirable, with a proven track record of meeting or exceeding sales quotas. 2. Inbound and Outbound Call Experience: Hands-on experience managing both inbound inquiries and conducting proactive outbound calls and emails to generate leads. Job Details Total Experience : Relevant Experience : Language Expertise : Open Positions : Educational Qualification : Please fill the following Details Please Upload your Resume. We will use this to find right opportunity for you Abhisek Gosh HR Operation, India I have been working at Denave for over 7 years and it has been an enriching and fruitful relationship. Denave is a multicultural organization that allows you to interact with people from various nationalities and backgrounds while offering cross-functional learning opportunities. The company prioritizes employee well-being and quite frequently organizes team building, events, and sports activities. Program Manager, Malaysia Fatin Halim Learning & Development, Malaysia At Denave, my ideas are valued, and my efforts are appreciated and recognized. Denave is a ground to be planted in if you want to flourish your career in terms of skillsets, compensation, titles, and new responsibilities. As a mother, Denave has helped me find the right work-life balance allowing me to continue my journey as a successful employee and simultaneously take care of my mental health. Christina Krishnan Inside Sales Account Manager, Malaysia My years in Denave have been professionally rewarding. The various training and development programs at Denave have helped improve my expertise and skills in leadership, time management, and more. Some of the positives of working at Denave have been its open culture, team-building activities, and nurturing relationships with colleagues. Nguyen Dieu Linh Moutusi Ghosh HR INTL & Recruitment, India I have been associated with Denave for over 5 years and the journey so far has been very enriching in terms of career growth, new learnings, experiences, and professional grooming. One of the striking differentiators has been the support and guidance provided by the mentors in defining my career goals at Denave. Priya Pandey Senior Manager-Transition, India Nida Samreen To view this video please enable JavaScript, and consider upgrading to a web browser that Video Player is loading. Play Video Current Time 0:00 Stream Type Seek to live, currently behind live Remaining Time 0:00 Playback Rate Descriptions descriptions off , selected subtitles settings , opens subtitles settings dialog subtitles off Audio Track This is a modal window. The media could not be loaded, either because the server or network failed or because the format is not supported. Beginning of dialog window. Escape will cancel and close the window. Font Size Text Edge Style Font Family Reset restore all settings to the default values Done Close Modal Dialog End of dialog window. To view this video please enable JavaScript, and consider upgrading to a web browser that This is a modal window. The media could not be loaded, either because the server or network failed or because the format is not supported. Beginning of dialog window. Escape will cancel and close the window. Font Size Text Edge Style Font Family To view this video please enable JavaScript, and consider upgrading to a web browser that This is a modal window. The media could not be loaded, either because the server or network failed or because the format is not supported. Beginning of dialog window. Escape will cancel and close the window. Font Size Text Edge Style Font Family To view this video please enable JavaScript, and consider upgrading to a web browser that This is a modal window. The media could not be loaded, either because the server or network failed or because the format is not supported. Beginning of dialog window. Escape will cancel and close the window. Font Size Text Edge Style Font Family To view this video please enable JavaScript, and consider upgrading to a web browser that This is a modal window. The media could not be loaded, either because the server or network failed or because the format is not supported. Beginning of dialog window. Escape will cancel and close the window. Font Size Text Edge Style Font Family To view this video please enable JavaScript, and consider upgrading to a web browser that This is a modal window. The media could not be loaded, either because the server or network failed or because the format is not supported. Beginning of dialog window. Escape will cancel and close the window. Font Size Text Edge Style Font Family To view this video please enable JavaScript, and consider upgrading to a web browser that This is a modal window. The media could not be loaded, either because the server or network failed or because the format is not supported. Beginning of dialog window. Escape will cancel and close the window. Font Size Text Edge Style Font Family To view this video please enable JavaScript, and consider upgrading to a web browser that This is a modal window. The media could not be loaded, either because the server or network failed or because the format is not supported. Beginning of dialog window. Escape will cancel and close the window. Font Size Text Edge Style Font Family Build new skills, further your potential, and shape the direction of your careers through a learning approach in a collaborative environment.

Posted 1 month ago

Apply

4.0 - 6.0 years

5 - 11 Lacs

Guwahati, Kolkata

Work from Office

Qualifications • BE/ B.Tech/ M.Tech/ MCA with 60%+ throughout the academics. • Security certifications like CEH or equivalent preferred. Experience and Skillset • Minimum 2 +years hands-on experience with one or more SIEM tools (Log Logic, LogRhythm, Splunk, QRadar, ArcSight etc.). • In-depth understanding of security threats (preferably OWASP Top 10 vulnerabilities), threat attack methods and the current threat environment. • Proficient in Incident Management and Response. • Basic knowledge of Windows and Unix environments. • Knowledge of OSI Model, TCP/IP Protocols, network security. • Knowledge about other security tools like – Packet Analyzers, HIPS/NIPS, Network Monitoring tools, Cloud Security, AV, EDR, WAF etc. Responsibilities • Responsible for working in a 24x7 Security Operation center (SOC) environment. • Carry out investigation and correlation and work with the stakeholders towards mitigation and closure of security incidents. • Monitor various dash boards from different security solutions on shift basis. • Work with the engineering team for Sensor and SIEM rules fine-tuning. • Prepare various management reports from SIEM and other security solutions. • Provide analysis and trending of security log data from a large number of heterogeneous security devices. • Provide threat and vulnerability analysis as well as security advisory services. • Analyze and respond to previously undisclosed software and hardware vulnerabilities. • Investigate, document, and report on information security issues and emerging trends. • Seamlessly integrate with the team work culture, ensure proper information flow across shifts, prepare/take part in shift handovers. • Communicate effectively by contributing significantly to the development and delivery of a variety of written and visual documents for diverse audiences. Location: Guwahati If you’re interested please share below mention details for the same. Location Are you willing to relocate to Guwahati? : Current Co Experience Current CTC Expected CTC Notice Period Offer in Hand Highest Education SSC % HSC % Graduation % University Name Email ID:ashwini.chakor@ril.com Regards,

Posted 1 month ago

Apply

4.0 - 8.0 years

4 - 8 Lacs

Cuttack, Odisha (Orissa), India

On-site

Key Deliverables: Conduct operations audits and security surveys across all assigned sites Supervise on-site training programs and ensure guard readiness Implement emergency protocols and fire safety readiness Monitor security devices and update daily visit and evaluation reports Role Responsibilities: Plan and execute site visits as per route charts and supervision plans Train security personnel in surveillance, access control, and emergency handling Check serviceability of security equipment and fire safety tools Maintain accurate site documentation and submit action reports

Posted 1 month ago

Apply

4.0 - 8.0 years

4 - 8 Lacs

Bengaluru, Karnataka, India

On-site

Key Deliverables: Conduct operations audits and security surveys across all assigned sites Supervise on-site training programs and ensure guard readiness Implement emergency protocols and fire safety readiness Monitor security devices and update daily visit and evaluation reports Role Responsibilities: Plan and execute site visits as per route charts and supervision plans Train security personnel in surveillance, access control, and emergency handling Check serviceability of security equipment and fire safety tools Maintain accurate site documentation and submit action reports

Posted 1 month ago

Apply

4.0 - 8.0 years

4 - 8 Lacs

Hyderabad, Telangana, India

On-site

Key Deliverables: Conduct operations audits and security surveys across all assigned sites Supervise on-site training programs and ensure guard readiness Implement emergency protocols and fire safety readiness Monitor security devices and update daily visit and evaluation reports Role Responsibilities: Plan and execute site visits as per route charts and supervision plans Train security personnel in surveillance, access control, and emergency handling Check serviceability of security equipment and fire safety tools Maintain accurate site documentation and submit action reports

Posted 1 month ago

Apply

4.0 - 8.0 years

4 - 8 Lacs

Delhi, India

On-site

Key Deliverables: Conduct operations audits and security surveys across all assigned sites Supervise on-site training programs and ensure guard readiness Implement emergency protocols and fire safety readiness Monitor security devices and update daily visit and evaluation reports Role Responsibilities: Plan and execute site visits as per route charts and supervision plans Train security personnel in surveillance, access control, and emergency handling Check serviceability of security equipment and fire safety tools Maintain accurate site documentation and submit action reports

Posted 1 month ago

Apply

4.0 - 8.0 years

4 - 8 Lacs

Jaipur, Rajasthan, India

On-site

Key Deliverables: Conduct operations audits and security surveys across all assigned sites Supervise on-site training programs and ensure guard readiness Implement emergency protocols and fire safety readiness Monitor security devices and update daily visit and evaluation reports Role Responsibilities: Plan and execute site visits as per route charts and supervision plans Train security personnel in surveillance, access control, and emergency handling Check serviceability of security equipment and fire safety tools Maintain accurate site documentation and submit action reports

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies