Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 7.0 years
0 Lacs
navi mumbai, maharashtra
On-site
You will be working as an L2 Kubernetes Engineer for our client located in Vashi, Navi Mumbai. In this role, you will be responsible for responding to incidents and service requests from the L1 team or other stakeholders. You will collaborate with the L1 team to diagnose issues and escalate complex cases. Your tasks will include on-boarding micro-services/container images in Kubernetes platform, performing upgrades and patch management for Kubernetes/OpenShift environments, and ensuring proper configuration of networking, storage, and security policies within the cluster. Additionally, you will be conducting routine checks for high availability, scaling, and backup. Investigating and resolving issues related to pod failures, container issues, networking, resource limits, pod scheduling, image pulling, etc. Reviewing logs and metrics to identify potential issues before they escalate. Conducting root cause analysis for recurring incidents and suggesting improvements, creating and maintaining documentation related to troubleshooting steps, cluster configuration, and best practices. You will be responsible for updating runbooks of issues faced, ensuring the high availability of clusters, implementing auto-scaling as necessary, optimizing resource usage and cost, implementing context-based Routing as and when required, setting up alerts and taking necessary actions based on alerts. Engaging required specialized teams (e.g., Network, Dev, L3 etc.), working with OEM Support to ensure resolution of reported issues, and remediating security violations as identified by the customer's security team. As an L3 Kubernetes Engineer, with at least 5+ years of experience, you will be tuning the performance of Kubernetes clusters and providing deep technical expertise to resolve complex issues not addressed by the L2 team. You will lead troubleshooting of Kubernetes/OpenShift cluster failures, networking issues, and performance bottlenecks. Addressing issues related to multi-cluster setups, persistent storage, and integrations with other services. You will be responsible for designing and optimizing Kubernetes/OpenShift architectures for scalability, high availability, and fault tolerance. Moreover, you will recommend and implement improvements to cluster performance, security, and reliability, manage multi-cloud or hybrid cloud Kubernetes environments, and optimize cross-platform operations. Ensuring compliance with industry standards, best practices, and internal security guidelines, implementing advanced automation for provisioning, scaling, and managing Kubernetes/OpenShift environments using tools like Terraform, Ansible, etc. You will design and optimize CI/CD pipeline configurations for Kubernetes/OpenShift environments, take the lead on major incidents and outages, perform root cause analysis (RCA), and propose long-term solutions to prevent recurrence. Your responsibilities will also include providing detailed post-incident reports, collaborating with teams to ensure timely resolution, conducting Quarterly Health Check Audits, optimizing based on Health Checks, participating in the planning and re-design of Kubernetes architecture, checking compatibility of various Kubernetes components, and creating an upgrade/migration plan. Certifications such as Certified Kubernetes Administrator and Red Hat OpenShift Administrator are considered good to have for this position. If you have any relevant reference, please share it with us.,
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
You will be responsible for the administration, maintenance, and support of On-prem Windows Server environments, AWS, and Azure cloud infrastructure. This includes managing and optimizing the performance, security, and availability of on-premises and cloud-based systems, as well as providing technical support to end-users and other IT staff. Your main responsibilities will include: On-premises Windows Server Administration: - Installing, configuring, and maintaining Windows Server operating systems such as Server 2016, 2019, 2022. - Managing Active Directory, Group Policy, and user accounts. - Implementing and managing security policies and procedures. - Troubleshooting and resolving server and application issues. - Maintaining backups and disaster recovery plans. - Patching and updating servers. - Monitoring server performance and resource utilization. Azure/AWS Cloud Administration: - Managing virtual machines (VMs), networks, storage, and other Azure or AWS services. - Implementing and managing Azure/AWS security policies and procedures. - Monitoring Azure/AWS resource utilization and performance. - Automating tasks using Azure/AWS automation tools. - Implementing and managing infrastructure as code (IaC). - Deploying and managing applications in Azure/AWS. - Working with Azure/AWS Active Directory. General IT Responsibilities: - Providing technical support to end-users. - Participating in on-call rotation. - Documenting IT processes and procedures. - Collaborating with other IT staff. - Staying current with new technologies and trends. Basic Requirements: - Bachelor's degree in Computer Science, Information Technology, or related field, or equivalent work experience. - Proven experience in a Windows System Administrator role, managing Windows Server 2012/2016/2019 environments. - Solid experience with cloud services administration (e.g., Microsoft Azure, AWS). Preferred Skills: - Certifications such as Microsoft Certified Systems Administrator (MCSA), Microsoft Certified Solutions Expert (MCSE), or equivalent cloud certifications (e.g., Azure Administrator Associate, AWS Certified SysOps Administrator). - Knowledge of ITIL and industry best practices. - Familiarity with monitoring tools and services (e.g., Nagios, Prometheus, Zabbix). - Kubernetes and containerization of Windows. - Experience with virtualization technologies (e.g., Hyper-V, VMware). - Strong knowledge of systems and networking software, hardware, and networking protocols. - Experience with scripting and automation. - Knowledge of data protection operations and disaster recovery. - Ability to create a secure and robust network environment. This position does not require travel or relocation. Motorola Solutions is committed to an inclusive and accessible recruiting experience for candidates with disabilities or other physical or mental health conditions. If you believe you would be a great addition to the team, even if you do not meet all the preferred skills, we encourage you to apply.,
Posted 1 week ago
8.0 - 13.0 years
12 - 20 Lacs
hyderabad
Work from Office
Job Description: Intune SME Engineer Role & Responsibilities Design, deploy, and manage Microsoft Intune and Enterprise Mobility + Security (EMS) solutions. Provide L3-level support for endpoint management, configuration policies, application deployment, and device compliance. Automate routine tasks and workflows using PowerShell scripting to improve operational efficiency. Troubleshoot complex issues related to device management, enrollment, and security policies. Collaborate with cross-functional teams to implement enterprise mobility strategies and ensure policy compliance. Maintain documentation of configurations, procedures, and best practices. Ensure security standards are met for mobile and endpoint devices through proactive monitoring and policy enforcement. Preferred Candidate Profile Strong hands-on experience with Microsoft Intune and EMS. Proven expertise in providing L3-level technical support for endpoint management. Proficiency in PowerShell scripting for automation and administrative tasks. Experience in designing automated workflows for device management and compliance reporting. Good understanding of enterprise mobility, device security, and cloud management concepts. Strong problem-solving skills with the ability to handle escalated issues independently.
Posted 1 week ago
5.0 - 8.0 years
0 Lacs
noida, uttar pradesh, india
On-site
Responsibilities Calling all innovators - find your future at Fiserv. We're Fiserv, a global leader in Fintech and payments, and we move money and information in a way that moves the world. We connect financial institutions, corporations, merchants, and consumers to one another millions of times a day - quickly, reliably, and securely. Any time you swipe your credit card, pay through a mobile app, or withdraw money from the bank, we're involved. If you want to make an impact on a global scale, come make a difference at Fiserv. Job Title Specialist, Risk Assurance What does a successful Risk and Compliance Specialist do at Fiserv: Fiserv is seeking a skilled risk and compliance Specialist to join its Enterprise Risk and Controls team. This dynamic role spans multiple responsibilities, including Third Party Risk Assessments for vendors and support for PCI and SOC audits as part of the organization's Third-Party Audit initiatives. The position is ideal for professionals who are adaptable and eager to contribute across various risk programs within the department. The role primarily centers on contributing to the Third Party Risk Management (TPRM) function. It involves gaining a comprehensive understanding of security policies, standards, and related processes within the scope of the TPRM program. Leveraging strong assessment capabilities, you will ensure that vendor-related risks are effectively identified, evaluated, mitigated, and continuously monitored to uphold the highest standards of security and compliance. What you will do: Developing detailed understanding of security policies, standards, and associated processes as it pertains to third party risk management program. 5-8 years of experience in the domains such as risk and compliance, information security Driving collaboration between cross-functional stakeholders and facilitating strong partnership with Fiserv Business Units Capability of contributing to TRPM Risk transformation projects in alignment with organization strategy. Responsible for independently conducting third-party risk assessment in line with security standards, practices encompassing people, process and technology controls Proficient in reviewing documentation including but not limited to security policies, processes, SOPs, third party audit/assurance reports including SOC 2, PCI AOC/ROC/ROV/SAQ, ISAE, ISMS, penetration testing, vulnerability scanning reports to identify gaps/exceptions Responsible for monitoring, tracking risks through closure by collaborating with multiple constituents including internal and external stakeholders ensuring auditable results are maintained throughout the engagement. Ensure accurate and timely review responsible for well-written observations, and walking stakeholders through the process lifecycle as needed Lead and participate in regional and global TPRM governance forums and liaise with business stakeholders. Document and maintain the relevant documentation. Establish trust and credibility with key partners develop and foster constructive professional relationships with multiple stakeholders including but not limited to executive and line management, risk officers, risk contacts and third-party contacts Work on vendor events, liaison with business stakeholders and follow-up with vendors Mentor and train Junior team members on Vendor Risk Assessment program. What you will need to have: Bachelor's Or Master's degree from an accredited university is preferred, equivalent work experience will be considered. 5- 8 years of experience in IT Risk and Compliance Management or Information Security domain Good interpersonal, written/verbal communication, and organizational skills Ability to handle internal and external discussions/interactions issues in a professional, assertive, and proactive manner Ability to work effectively within a matrixed organization Strong organizational and time management skills with Global stakeholder management Strong MS office skills (Microsoft Excel, Word, PowerPoint, and SharePoint) Exposure to GRC ( Governance, Risk and Compliance tools) What would be great to have: Financial services experience, including working in highly regulated environments Knowledge of IT audit, ISO 27001, ITIL, Vendor Risk Management process Ability to interact across all levels of management Attention to detail with a commitment to high-quality standards A successful track record for delivering results in a timely manner Industry Certifications: CISA, CRISC, CTPRA, ISO 27001 LA/LI or equivalent etc.) Thank you for considering employment with Fiserv. Please: Apply using your legal name Complete the step-by-step profile and attach your resume (either is acceptable, both are preferable). Our commitment to Diversity and Inclusion: Fiserv is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, gender, gender identity, sexual orientation, age, disability, protected veteran status, or any other category protected by law. Note to agencies: Fiserv does not accept resume submissions from agencies outside of existing agreements. Please do not send resumes to Fiserv associates. Fiserv is not responsible for any fees associated with unsolicited resume submissions. Warning about fake job posts: Please be aware of fraudulent job postings that are not affiliated with Fiserv. Fraudulent job postings may be used by cyber criminals to target your personally identifiable information and/or to steal money or financial information. Any communications from a Fiserv representative will come from a legitimate Fiserv email address.
Posted 1 week ago
3.0 - 7.0 years
7 - 14 Lacs
pune
Work from Office
Role: System Administrator for Traksys MES Location: TTL Offshore / Pune Skills Required: Strong experience in system/portal administration and maintenance Good understanding of database management (queries, backups, troubleshooting) Ability to manage user access, permissions, and security policies Monitoring and ensuring system uptime, performance, and log management Coordinating with application and infrastructure teams for issue resolution Broad technical capability to handle portal, DB, and other system-level tasks
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
hyderabad, telangana
On-site
As a Senior Security Engineer at iCIMS, you will play a crucial role in leading our Information Security team to handle diverse security-related tasks and issues for the company, focusing particularly on Workflow Automation. Your responsibilities will include applying security policies to meet security objectives, engineering security controls to protect our environment, and planning and recommending modifications or adjustments to corporate systems and production environments. You will be instrumental in implementing security best practices, leading system deployments and integrations, assisting in incident management processes, and developing and reporting key performance indicators. Additionally, you will be expected to engage in professional development to continually grow your professional skills and knowledge. Joining iCIMS means becoming a part of a team that helps global companies transform business and the world through the power of talent. Our customers achieve incredible feats such as designing rocket ships, creating vaccines, and delivering consumer goods globally, all with a smile. As the Talent Cloud company, we empower organizations to attract, engage, hire, and advance the right talent. We are deeply passionate about helping companies build a diverse, winning workforce and cultivating an inclusive, purpose-driven, and innovative work environment where everyone belongs. Your responsibilities will include implementing system security measures to ensure confidentiality, integrity, availability, authentication, and non-repudiation. You will lead the deployment, management, and automation of security services such as intrusion detection and response systems, security event and monitoring systems, anti-virus/antimalware, vulnerability management, data loss prevention (DLP), and other systems that align with overall cybersecurity objectives. Your expertise in key automation techniques and technologies will enable you to effectively secure and streamline security operations across business units. You will implement and automate security measures to resolve vulnerabilities, mitigate risks, and recommend security changes as necessary. Additionally, you will verify and update security documentation, lead automation-focused projects, provide ad hoc information security support, and ensure that recommended solutions adhere to iCIMS security standards and policies. To qualify for this role, you should have at least 5 years of experience in an information security analyst/engineering role with a significant focus on security automation. You should possess proven experience in automating security operations tools, logging systems, intrusion detection/prevention systems (IDS/IPS), anti-virus, SIEM, vulnerability management tools, DLP, endpoint protection, and CASB. Experience with cloud security architecture and developing/implementing cloud systems in AWS, Azure, or GCP is essential. Strong organizational skills, attention to detail, excellent communication, and interpersonal skills are crucial for this role. Proficiency in Microsoft Office/Office 365 and automation tools and scripting languages such as Python is required. Preferred qualifications include a Bachelor's Degree in Information Security, Computer Engineering/Science, Information Management Systems, or equivalent. Certifications such as CISSP, CCSP, CEH, or equivalent are preferred, along with certifications in automation tools/platforms (e.g., Ansible, Puppet, Chef) and major cloud service providers (AWS, Azure, GCP, etc.). At iCIMS, we foster a diverse and inclusive environment where everyone belongs. We celebrate diversity and are committed to creating an inclusive workplace for all employees. Our approach helps us build a winning team that represents various backgrounds, perspectives, and abilities. In terms of compensation and benefits, iCIMS offers competitive health and wellness benefits, including medical insurance for employees and dependent family members, personal accident and group term life insurance, bonding and parental leave, lifestyle spending account reimbursements, wellness services offerings, sick and casual/emergency days, paid holidays, tuition reimbursement, retirement benefits, and more. Benefits and eligibility may vary based on location, role, and tenure. Learn more about our benefits at https://careers.icims.com/benefits.,
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
chennai, tamil nadu
On-site
You will be responsible for conducting vulnerability assessments and penetration tests to identify security weaknesses in an organization's systems and networks. You will evaluate, rate, and perform risk assessments on assets, prioritizing vulnerabilities discovered along with remediation timelines. Additionally, you will be sending and receiving notifications to the Subject Matter Experts (SMEs) of vulnerabilities within the environment, maintaining knowledge of the threat landscape, and providing reporting, analysis, and follow-up. Your role will involve providing vulnerability analysis and producing reports for management, developing and implementing security policies and procedures to prevent cyber-attacks, monitoring network traffic to identify potential security threats, and investigating security incidents while providing recommendations for remediation. You will also conduct risk assessments to identify potential security threats and vulnerabilities and stay up-to-date on the latest security threats and vulnerabilities. Furthermore, you will be required to provide training and guidance to other security professionals, leveraging your Bachelor's degree in Computer Science, Information Security, or a related field, along with 3+ years of experience in vulnerability management. You should have a strong understanding of vulnerability assessment and penetration testing methodologies, familiarity with vulnerability scanning tools and reporting solutions, experience with risk assessment and prioritization techniques, excellent communication and writing skills, ability to work independently and as part of a team, and strong analytical and problem-solving skills.,
Posted 2 weeks ago
1.0 - 5.0 years
0 Lacs
karnataka
On-site
As an Information Security Entry Analyst at Xylem, you will play a crucial role in safeguarding the organization's data from cyber threats. Your responsibilities will include monitoring security systems, analyzing potential threats, and contributing to the development of security protocols. Under the guidance of senior staff, you will learn best practices to enhance the overall security posture of the company. Your technical responsibilities will involve configuring and maintaining network and system security devices, conducting forensic analysis and incident response, managing security information and event management tools, implementing data loss prevention solutions, conducting web application security testing, managing identity and access management systems, performing security assessments and audits, as well as maintaining security documentation and procedures. In terms of communication responsibilities, you will collaborate with cross-functional teams to identify and mitigate security risks, communicate security incidents and findings to relevant stakeholders, work with external auditors and vendors, participate in security incident response and crisis management planning, communicate security best practices and policies to employees, and establish relationships with security vendors and industry peers. To excel in this role, you should be committed to continuous professional development, demonstrating a willingness to learn, improve, and stay updated on industry trends. Collaboration and teamwork are essential, as you will work effectively with others, contribute to team goals, and appreciate diverse perspectives for better solutions. Your results-driven performance will focus on delivering high standards of work efficiently and effectively. Qualifications for this position include a bachelor's degree in Computer Science, Information Technology, or a related field, or equivalent work experience of 1-2 years with exposure to fundamental theories, principles, and concepts. You should have a basic understanding of information security principles and practices, knowledge of common cybersecurity threats and vulnerabilities, strong analytical and problem-solving skills, experience with database management systems, and the ability to troubleshoot software development issues. Your willingness to work collaboratively with team members and stakeholders, along with good written and verbal communication skills, will contribute to your success in this role. Join the global Xylem team and contribute to innovative technology solutions that transform water usage, conservation, and re-use. Xylem's products impact public utilities, industrial sectors, residential areas, and commercial buildings, providing smart metering, network technologies, and advanced analytics for water, electric, and gas utilities. Partner with Xylem in creating a world where water challenges are met with ingenuity and dedication, recognizing the power of diversity, equity, and inclusion in driving innovation and global competitiveness.,
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
maharashtra
On-site
As a Network Security Engineer at Birlasoft, you will play a crucial role in designing, implementing, and maintaining secure network infrastructures. You will be part of a global leader that harnesses Cloud, AI, and Digital technologies to empower societies worldwide. With your expertise in firewalls, IDS/IPS, VPN configurations, and enterprise security solutions, you will contribute to enhancing the efficiency and productivity of businesses. Your key responsibilities will include providing network security design services that not only meet but exceed customer requirements. You will be responsible for preparing Scope of Work, High-Level & Low-Level designs for security solutions, designing and implementing security policies, NATing rules, proxy rules, and DNS configurations. Additionally, you will lead the design and deployment of data centers with high security standards, implement and manage firewalls, VPNs, and enterprise IDS/IPS solutions, and support troubleshoot network security issues while applying best practices. Your expertise in WAN, LAN, Data Center Networks, Proxy, IDS, IPS security solutions will be essential for this role. You should have experience with security tools from Cisco, Juniper, Checkpoint, Fortinet, Palo Alto, and proficiency in managing Cisco ASA, Firepower, and Bluecoat appliances for proxy security. Strong knowledge of VPN configurations, DR testing, troubleshooting, and security policies is required, along with hands-on experience with network analysis tools like InfoBlox and SolarWinds. Your ability to escalate, resolve, and document security threats efficiently will be crucial in ensuring the seamless integration and troubleshooting of multi-vendor security infrastructure. If you are passionate about network security and possess the required skills and experience, we invite you to join our team at Birlasoft and contribute to building sustainable communities while staying at the forefront of technological innovation.,
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
karnataka
On-site
You will be responsible for continuously monitoring enterprise systems, network operations, and application performance using advanced monitoring tools. Identifying and responding to alerts in real time is crucial to prevent disruptions and ensure high system availability. You will utilize ETL Integration Platforms like Azure Data Factory and MDM Systems such as Stibo STEP and Reltio to oversee and optimize data flows across multiple systems. Ensuring data consistency, accuracy, and integrity by implementing robust monitoring processes for data pipelines will be part of your responsibilities. Diagnosing and resolving technical issues within Databricks, Cosmos DB, and Azure Pipelines, with a focus on minimizing downtime, will be essential. Collaborating with infrastructure, application, and engineering teams to resolve complex incidents and perform root cause analysis is also a key aspect of this role. You will work closely with IT, data engineers, and business units to identify performance bottlenecks and implement effective solutions. Communicating technical findings and remediation plans to non-technical partners in an understandable manner is necessary. Performing scheduled maintenance, system upgrades, and release deployments with minimal impact on operations is a critical part of your duties. Developing and implementing automation scripts to streamline monitoring and alerting processes, thereby enhancing system reliability, will also be within your scope. Creating and maintaining comprehensive documentation, including standard operating procedures (SOPs), configuration details, and incident resolution guides, is vital. Actively contributing to the team's knowledge base and training materials to support the development of team members is expected. Staying updated on standard processes for ensuring system resiliency, high availability, and disaster recovery is essential. Recommending and implementing improvements to enhance platform performance, scalability, and security are part of your responsibilities. Ensuring compliance with organizational security policies and standards, including data protection and governance requirements, is mandatory. Additionally, participating in audits and supporting regulatory compliance initiatives will be required. Qualifications and Requirements: - Bachelor's degree or equivalent experience in Information Technology, Computer Science, or a related field. Equivalent practical experience will also be considered. - Proficiency in monitoring and managing data integration using ETL platforms, Databricks, Cosmos DB, and Azure Pipelines. - Hands-on experience with MDM systems such as Stibo STEP and Reltio. - Experience with network and application monitoring tools like Splunk, Dynatrace, or Azure Monitor. - Familiarity with synthetic monitoring platforms for proactive web and API performance testing. - Strong troubleshooting skills to resolve system performance issues, even in high-pressure situations. - Ability to perform root cause analysis and develop actionable insights to prevent recurring issues. - Excellent verbal and written communication skills for engaging with technical teams and non-technical collaborators. - Experience working effectively in a multi-functional, collaborative environment. - Willingness to work in a high-pressure environment with flexible shifts to provide 24x7 support. - Enthusiasm for learning new tools, technologies, and practices to enhance system monitoring and operations.,
Posted 2 weeks ago
2.0 - 6.0 years
0 Lacs
pune, maharashtra
On-site
The Junior Regional Controller role at Pinkerton in Pune, Maharashtra, India, involves driving the development and standardization of security policies and programs to safeguard corporate business operations. As a member of the Pinkerton team, you will be expected to embody the core values of integrity, vigilance, and excellence. Your responsibilities will include monitoring and responding to security and safety-related events, providing exceptional customer service, and conducting live monitoring of electronic security systems to detect unauthorized activities that may pose a threat to client operations. You will serve as a primary point of contact for employees and other relevant parties seeking assistance or security-related advice at client sites. Additionally, you will be responsible for escalating incidents or conditions that could impact client interests to senior management. Collaborating with the Security Analyst Supervisor, you will analyze security incidents and prepare detailed reports for further action. Flexibility and adaptability are key competencies required for this role, along with effective communication skills, attention to detail, and the ability to drive progressive change. The ideal candidate will have experience working with global teams and a background in Global Command Centre operations. A graduation or bachelor's degree, along with formal security education, is required. Pinkerton values diversity and welcomes candidates with varied backgrounds, experiences, and perspectives. This position may involve exposure to sensitive information and regular computer usage. Clear communication abilities and the capacity to adjust focus between close and distance vision are essential for effective performance in this role. As a Junior Regional Controller at Pinkerton, you will play a vital role in ensuring the security and safety of client operations while upholding the organization's commitment to excellence and vigilance. Join our team and be part of a company with 170 years of history as an industry leader making a global impact.,
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
thiruvananthapuram, kerala
On-site
As a member of the Support organization at Oracle, your primary focus will be delivering post-sales support and solutions to Oracle's customer base while also advocating for customer needs. Your responsibilities will include resolving post-sales non-technical customer inquiries through phone and electronic channels as well as addressing technical questions related to the use of and troubleshooting for our Electronic Support Services. You will serve as a key point of contact for customers, facilitating customer relationships with Support and providing guidance to internal Oracle employees on various customer situations and escalated issues. Your role will involve designing and implementing robust OCI networking solutions, encompassing Virtual Cloud Networks (VCNs), subnets, route tables, security lists, DRGs, and network load balancers. You will be tasked with optimizing OCI network performance, ensuring efficient resource allocation, and maintaining high availability. Additionally, you will develop and manage network topologies, VPNs, and interconnects for multi-cloud and hybrid environments. In terms of security, you will create and enforce security policies and controls within OCI, including Identity and Access Management (IAM), Network Security Groups (NSGs), and Data Encryption. Your responsibilities will also include designing and implementing security solutions to safeguard OCI resources and data from unauthorized access and vulnerabilities. Ensuring compliance with industry standards, regulatory requirements, and organizational security policies will be a crucial aspect of your role. You will play a key role in designing high-level implementation plans for reports generated from Cloud Guard, DataSafe, CIS Reporting, and other tools. Integration of OCI networking and security solutions with existing on-premises systems and other cloud platforms will be part of your responsibilities. Your expertise will be essential in implementing and optimizing security measures such as Web Application Firewalls (WAFs), Intrusion Detection Systems (IDS), and security monitoring tools. Furthermore, you will lead OCI networking and security projects from design through deployment, ensuring alignment with business objectives and technical requirements. Collaboration with project managers, cloud engineers, and other stakeholders will be necessary to ensure successful project delivery. Your role may also involve providing expert-level troubleshooting and resolution for complex networking and security issues within OCI environments. To excel in this role, you should have extensive experience in cloud networking and security architecture, particularly with a focus on Oracle Cloud Infrastructure (OCI). Proven expertise in designing, implementing, and managing OCI networking and security solutions, as well as familiarity with security tools and compliance practices, will be valuable assets. Additionally, strong problem-solving skills, leadership abilities, and effective communication with technical and non-technical stakeholders are essential for success in this position. Overall, as an Advisory Systems Engineer at Oracle, you will be expected to provide expert technical advice, lead incident response efforts, and stay informed about emerging OCI technologies and trends in cloud networking and security. Your contribution will be vital in promoting innovative solutions to address evolving business needs and enhance OCI infrastructure. Oracle is a global leader in cloud solutions, committed to leveraging tomorrow's technology to solve today's challenges. With a focus on diversity and inclusivity, Oracle values diverse perspectives and backgrounds that inspire true innovation. Operating with integrity for over 40 years, Oracle partners with industry leaders across various sectors, offering global opportunities that prioritize work-life balance and employee well-being. Employee benefits at Oracle are highly competitive, designed on principles of parity and consistency. The company places a strong emphasis on employee well-being, offering flexible medical, life insurance, and retirement options. Oracle also encourages its employees to engage in volunteer programs to give back to their communities. At Oracle, inclusivity is a core value, and the company is committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability, please reach out by calling +1 888 404 2494, option one. Please note that Oracle is a United States Affirmative Action Employer.,
Posted 2 weeks ago
3.0 - 7.0 years
7 - 11 Lacs
indore, bengaluru
Work from Office
ECI is the leading global provider of managed services, cybersecurity, and business transformation for mid-market financial services organizations across the globe. From its unmatched range of services, ECI provides stability, security and improved business performance, freeing clients from technology concerns and enabling them to focus on running their businesses. More than 1,000 customers worldwide with over $3 trillion of assets under management put their trust in ECI. At ECI, we believe success is driven by passion and purpose. Our passion for technology is only surpassed by our commitment to empowering our employees around the world . The Opportunity: ECI has an exciting opportunity for a SOC Engineer , who is responsible for analyzing and responding to network security events. The SOC Engineer will work collaboratively to detect and respond to information security incidents, maintain and follow procedures for security event alerting, and participate in security investigations. The SOC Engineer will perform tasks including monitoring, research, classification, and analysis of security events that occur on the network or endpoint. In this role, you will act as a shift lead and review tickets before they are being escalated to clients. You will Investigate intrusion attempts and perform an in-depth analysis of exploits. This is an Onsite role. Rotational Shift What you will do: Acts as shift lead by managing the incident queue and assign incidents to available analysts based on priority. Make sure the incident is handled from end to end with defined SLA. Conduct expert analysis of SIEM logs to drive event and incident analysis. Provide expertise in categorizing and deep dive event logs to support timely and effective decision making in handling security breach cases. Launch and track investigations until resolution. Work with client or internal support teams to mitigate security threats and help them in improving the security posture of client environment. Perform threat hunt activities based on latest security vulnerabilities, advisories, and penetration techniques. Mitigate security threats and notify client. Contribute to the creation of SOC policies, procedures, and configuration standards. Manage and Administer security tools such as SIEM, EDR, Email gateway, etc. Advanced working skills with any one of the SIEM tools (ELK, Splunk, Qradar). Rule base Management, SOC Fine tuning. (Administer SIEM tool) Maintain 'On Call' availability for critical incident response scenarios and urgent threats. Demonstrate strong analytical, diagnostic, innovation, and collaboration skills. Exhibit enthusiasm, adaptability, and a passion for continuous learning, growth, and sharing of knowledge. Showcase exceptional presentation and communication abilities. Who you are: 3-5 years experience in the IT security industry, preferably working in a SOC environment. Bachelors in computer science/IT/Electronics Engineering, M.C.A. or equivalent University degree Certifications: CCNA, CEH, CHFI, GCIH, ITIL Experience with Security Information Event Management (SIEM) tools, creation of correlation rules and fine-tuning rules to administration of SIEM. Administration of Email security gateways, EDR, Antivirus Solutions. Should have expertise on TCP/IP network traffic and event log analysis. Configuration and Troubleshooting experience on Cisco ASA, PaloAlto firewalls would be an added advantage. Ability to work with minimal levels of supervision. Willingness to work in a job that involves 24/7 operations. Shift management and scheduling. Remain vigilant while continuing to maintain and enhance the overall security of ECI and the clients receiving our services. Maintain awareness about the potential risks based on the environment they are operating in and the clients they are working on Bonus points if you have: Knowledge and hands-on experience of implementation and management of IDS/IPS, Firewall, VPN, and other security products Knowledge and hands-on experience with SIEM tools Knowledge of ITIL disciplines such as Incident, Problem and Change Management Strong verbal and written English communication. Strong interpersonal and presentation skills ECIs culture is all about connection - connection with our clients, our technology and most importantly with each other. In addition to working with an amazing team around the world, ECI also offers a competitive compensation package and so much more! If you believe you would be a great fit and are ready for your best job ever, we would like to hear from you! Love Your Job, Share Your Technology Passion, Create Your Future Here!
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
hyderabad, telangana
On-site
You will be hired as an Associate Director of Cyber Security for our client, a US-based F100 GCC, located in Hyderabad, India. In this role, you will play a crucial part in the Cyber Security leadership team by creating and executing the enterprise-wide cyber security strategy. Your responsibilities will include leading various functional areas such as security operations, engineering, governance, risk management, and compliance. Reporting directly to the Head of I/O & Cyber Security, you will provide strategic direction, operational oversight, and technical leadership to safeguard the organization's information assets, systems, and infrastructure from both internal and external threats. Your main tasks will involve leading and managing a team of technical resources, overseeing the Security Operations Center (SOC), incident response, vulnerability management, threat intelligence, and endpoint protection. You will also be responsible for directing the development and implementation of security architecture, tools, and frameworks across cloud, on-premises, and hybrid environments. Collaboration with IT, legal, compliance, risk, privacy, and business stakeholders to manage security risk and ensure adherence to industry frameworks will be a critical aspect of your role. Additionally, you will drive the maturity of identity and access management (IAM), data loss prevention (DLP), zero trust architecture, and secure DevOps initiatives. It will be your responsibility to develop and maintain security policies, standards, metrics, and reporting to executive leadership and audit bodies. Building, leading, and mentoring a high-performing, diverse cybersecurity team across technical and GRC domains will also be part of your duties. Managing relationships with external vendors, partners, auditors, and regulatory entities will be essential, as well as supporting cyber incident response planning, tabletop exercises, and executive-level simulations. Furthermore, you will oversee the planning, execution, and delivery of technical projects, ensuring they are completed on time, within scope, and within budget. Collaboration with onshore teams to align offshore activities with overall business objectives and project goals will be crucial. Efficiently allocating and managing technical resources to meet project/operation demands and optimize productivity will also be one of your responsibilities. Implementing and maintaining quality assurance processes to ensure the highest standards of technical delivery, as well as facilitating effective communication between offshore and onshore teams, ensuring transparency and alignment on project status, risks, and issues, will be critical aspects of your role. To qualify for this position, you should hold a Bachelor's degree in computer science, Information Technology, or a related field, with a Master's degree being preferred. You should have at least 10+ years of progressive experience in cyber security, including a minimum of 5 years in senior leadership roles. Deep understanding of cyber security frameworks such as NIST CSF, NIST 800-53, MITRE ATT&CK is essential. Demonstrated experience in building and managing enterprise security programs in complex, regulated environments is required, along with the ability to influence at all levels, including executives and board members. Excellent leadership, communication, and stakeholder engagement skills are also necessary. Preferred qualifications include experience working in a global organization with distributed teams, certifications such as CISSP, CISM, CISA, CCSP, etc., and experience and certifications in ITIL, Agile, and DevOps practices. Experience working in Retail & Manufacturing and knowledge of managing regulatory environments such as HIPAA, SOX, PCI-DSS, GDPR, as well as experience integrating security in agile, DevOps, and CI/CD pipelines are also desirable.,
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
maharashtra
On-site
The role of WAF - L2 requires 3 to 10 years of experience in working on Network Security. The position is based in Mumbai and the ideal candidate should hold Product Certification in F5 WAF/Cloudfare Certified Professional. The candidate should have overall 3-6 years of experience in network security with a minimum of 3 years dedicated to managing WAF solutions. Proficiency in managing WAF, working with Windows, Linux, and Unix environments is essential. Hands-on experience in commissioning and implementing WAF solutions, integrating with various management and authentication authorization tools, and automating processes using scripting is required. Responsibilities include managing policies and exceptions, server traffic management, analysis, and troubleshooting tools. The candidate should have a good understanding of WAF solutions, incident, problem, service request management, change management, configuration management, and capacity management of WAF Setup. Proactively utilizing network monitoring tools to isolate events, supporting incident monitoring and analysis/response initiatives is crucial. Furthermore, the candidate should coordinate with users to ensure timely resolution of any trouble tickets, troubleshoot layers of the OSI Model, conduct daily performance checks, and maintain network security policy, standards, and procedures. Creating technical documentation, co-coordinating with OEMs, leading and mentoring L1 & L2 engineers team, implementing WAF alerts, rules, and policies, and closure of compliance and audit points are part of the job responsibilities. The candidate should be able to investigate, isolate, and resolve WAF incidents with RCA, implement SOP/Run book, update knowledge base, automate and integrate tools with security dashboard, and Infosec tools. Patch updates, upgradation, and ensuring SLA compliance, along with excellent communication skills, ability to manage complex issues, and ownership of technology are key aspects of the role.,
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
maharashtra
On-site
You are a dynamic and detail-oriented IT professional sought to join our team at Zill Consulting in a multifaceted role that encompasses IT project management, security expertise, and ERP oversight. In this position, you will be required to lead and implement IT projects, particularly Cloud Infrastructures, and ERP systems, preferably Zoho Suite. Additionally, you will play a pivotal role in maintaining security practices and systems to ensure the organization's information assets are safeguarded. Your responsibilities will include: IT Project Management: - Leading and managing IT projects from initiation to completion, ensuring timely delivery and adherence to scope. - Defining project scope, objectives, and deliverables in collaboration with senior management and stakeholders. - Coordinating cross-functional teams to ensure effective communication and collaboration. - Monitoring project progress, identifying risks, and implementing mitigation strategies. - Preparing and presenting project status reports to stakeholders and senior management. IT Security Specialist: - Developing, implementing, and maintaining comprehensive IT security policies, procedures, and protocols. - Conducting regular security audits, risk assessments, and vulnerability scans to address security threats. - Supporting compliance with relevant security standards and regulations, such as GDPR and ISO 27001. - Collaborating on security training and awareness programs for employees. - Responding to and managing security incidents and breaches, conducting root cause analysis and implementing corrective actions. ERP Specialist: - Overseeing the implementation, configuration, and maintenance of ERP systems to support business operations. - Collaborating with departments to understand their ERP needs and ensuring system alignment. - Managing ERP system upgrades and enhancements with minimal disruption to business operations. - Providing technical support and troubleshooting for ERP-related issues. - Developing and delivering training for end-users to ensure effective utilization of the ERP system. - Analyzing and optimizing ERP system performance, identifying areas for enhancement. Qualifications: - Bachelor's degree in information technology, Computer Science, or a related field; master's degree preferred. - Proven experience in IT project management, IT security, and Zoho suite systems. - Strong knowledge of IT security principles, practices, and technologies. - Hands-on experience with ERP systems such as Zoho Suite. - Excellent problem-solving, analytical, and critical-thinking skills. - Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams. - Ability to manage multiple priorities and work under pressure in a fast-paced environment. Preferred Skills: - Experience with cloud-based ERP solutions. - Familiarity with Cloud network security and infrastructure. - Experience in a similar industry or environment. - Experience in working with IT security measures and compliance.,
Posted 2 weeks ago
2.0 - 8.0 years
0 Lacs
thane, maharashtra
On-site
As a Senior Security Architect in the Banking & Financial Services sector, your primary responsibility will be to develop and maintain a comprehensive security architecture roadmap that is in alignment with business objectives and regulatory requirements. This includes conducting thorough security risk assessments for business applications (both on-premises and cloud-hosted) and APIs to identify potential threats, weaknesses, and recommending appropriate mitigation measures. You will be required to conduct threat modeling for applications at their inception and during major changes to ensure compliance with existing regulations. Additionally, you will review architecture designs, suggest security controls, and countermeasures to safeguard systems, applications, and data effectively. In this role, you will define and enforce security policies, standards, and guidelines to ensure compliance with industry best practices and regulations. Collaborating with development teams will be crucial to integrate security-by-design principles into the software development lifecycle. Creating dashboards and reports to track the progress of ongoing security reviews and driving automation and process improvement initiatives for streamlining security reviews will also be part of your responsibilities. Keeping abreast of emerging security threats and trends and recommending and implementing appropriate countermeasures is essential. Mentoring and guiding junior security team members to foster a culture of continuous learning and development will also be expected from you. To qualify for this role, you should hold a Bachelor's degree in Computer Science, Information Security, or a related field, along with 6-8 years of hands-on experience in security architecture, design, review, and implementation. Strong knowledge of security frameworks and methodologies, such as RBI guidelines, NIST Cybersecurity Framework, and OWASP ASVS, is required. An excellent understanding of cloud security principles and practices, especially AWS, is essential. Additionally, a minimum of 2 years of experience in the banking and financial services sector, with a deep understanding of industry-specific security regulations, would be preferred. Strong analytical and problem-solving skills, the ability to work independently, and manage multiple projects simultaneously are also necessary. Preferred qualifications for this role include advanced security certifications (e.g., CISSP, CISM), knowledge of DevOps and CI/CD practices, and experience with security automation and orchestration tools.,
Posted 2 weeks ago
10.0 - 15.0 years
0 Lacs
haryana
On-site
As the Director, TSG Information Security, Cyber Threat Management at Bain's Cyber Security Department, your primary mission is to safeguard the organization's digital assets and integrity by defining and implementing effective security strategies. You will play a crucial role in aligning security measures with the organizational strategy, leading the development and implementation of security controls that meet regulatory requirements and best practices. Your responsibilities include organizing and managing a team, focusing on both defensive and offensive security strategies to support the company's overall business objectives. You will oversee the monitoring and detection of cybersecurity events, leading efforts to identify and analyze sophisticated security threats such as malware, APTs, and targeted attacks. Collaborating with cross-functional teams, you will enable the use of advanced security tools and technologies to enhance the organization's security posture. Additionally, you will be responsible for incident response management, including the evolution of security runbooks, automation technologies, and forensic investigations to enhance security measures. Your role will involve establishing a threat intelligence capability, leveraging various sources to drive awareness and improve the organization's defensive posture. You will collaborate with intelligence and incident response teams to analyze security incidents and develop methodologies to enhance threat intelligence capabilities. Furthermore, you will work on vulnerability management, proactive security testing, and enhancing security posture through penetration testing and risk assessment. Your expertise will be crucial in driving efficiencies in Cyber Threat Management responses, reducing overall risk, and improving the organization's security standards. Additionally, you will play a key role in professional development and innovation, staying informed about emerging trends and technologies in cybersecurity and driving collaboration across the organization to address security concerns. To excel in this role, you should possess a Bachelor's degree in a related field, along with 10-15 years of relevant experience in Information Security technologies. Strong knowledge of security monitoring, incident detection, response tools, and security controls frameworks is essential. You should have experience working in a global company, deploying systems or applications, and solving complex cybersecurity problems. Excellent communication skills, analytical mindset, and the ability to work independently and collaboratively are also key requirements for this position. Overall, as the Director, TSG Information Security, Cyber Threat Management, you will lead the organization in enhancing its security posture, driving innovation, and ensuring the protection of digital assets in line with industry standards and best practices.,
Posted 2 weeks ago
0.0 years
0 Lacs
gurgaon, haryana, india
Remote
Noventiq is hiring! Noventiq (Noventiq Holdings PLC) is a leading global solutions and services provider in digital transformation and cybersecurity, headquartered in London. The company enables, facilitates, and accelerates digital transformation for its customers businesses, connecting 80,000+ organizations across all sectors with a vast selection of best-in-class IT vendors, alongside its own services and solutions. Noventiq delivered record gross revenue of $1.6 billion for the 12 months to March 31, 2023, an increase of 52% in constant currency. The companys growth is underpinned by its three-dimensional strategy to expand its markets, portfolio, and sales channels. The strategy is supported by an active approach to M&As which enables Noventiq to take advantage of the ongoing consolidation in the industry. Noventiq&aposs 6,400 employees work in approximately 60 countries throughout Asia, Latin America, Europe, Middle East, and Africamarkets with significant growth potential. One of the largest SIs in India with revenue close to 700M$ and growing to 900M$. 3500+ Employees in India for India. Total 28 Offices in India across North, South, West & East. 1000+ Resident Engineers across India. 2500+ technical resources in India for India. Technology partnerships with Top 3 Cloud Solution Providers, Top 3 Infrastructure companies, Top 10 Cybersecurity companies. Enviable customer base: 4 of Top 5 Banks, 3 of Top 5 IT companies, 3 of Top 5 BPOs, 3 of Top 5 Pharma companies. Largest partner to Microsoft with combined infeed of US$600M about 25% of Microsoft India revenues. About You We are looking for a highly skilled and experienced Microsoft Security SME/Architect to join our team. The ideal candidate will have extensive expertise with the Microsoft security suite, specifically Microsoft Defender for Cloud and Microsoft Defender for Office 365. This role involves leading the configuration of endpoint security solutions, ensuring integration with existing infrastructure, and aligning with security best practices Bottom of Form What You ll Do Microsoft Security Suite Expertise Serve as the Subject Matter Expert (SME) for Microsoft security suite, with specialist responsibilities in Microsoft Defender for Cloud and Microsoft Defender for Office 365. Lead the configuration, deployment, and management of endpoint security solutions using Microsoft Defender. Ensure integration of Microsoft Defender solutions with existing IT infrastructure and security tools. Provide expert guidance on the configuration, optimization, and maintenance of Microsoft Defender to enhance security posture . Endpoint Security Management Lead the design and implementation of endpoint security solutions, ensuring alignment with industry best practices and organizational security policies. Collaborate with IT and security teams to ensure the secure configuration of endpoints, including OS hardening and application of security policies. Conduct regular assessments of endpoint security configurations to identify and remediate vulnerabilities. Develop and maintain documentation for endpoint security configurations, policies, and procedures. Security Strategy and Architecture Understand and apply the principles of network and endpoint security, current threat and attack trends, and security best practices such as defense in depth. Work closely with security teams to explain the impacts of security configurations on end user devices and ensure alignment with overall security strategy. Develop and maintain a comprehensive security architecture framework for endpoint security. Provide strategic recommendations to enhance the security posture of the organization through the effective use of Microsoft security solutions. Training and Support Provide training and support to IT and security teams on the use and management of Microsoft Defender solutions. Act as a point of escalation for complex security issues related to Microsoft Defender. Stay up-to-date with the latest developments in Microsoft security technologies and threat landscape. Conduct knowledge sharing sessions and workshops to disseminate security best practices within the organization. What We Offer Insurance Group Medical Coverage, Group Personal Accident, Group Term Life Insurance Rewards and Recognition Program, Employee Referral Program, Wellness Program and CSR Initiatives Maternity and Paternity Leaves Company Sponsored Certification Program Learning/Development Courses, Cross Skill, Mentorship and Leadership Programs Quarterly Performance Feedback Sessions Savings, Investments and Retirement Benefits Flexible Work Hours, Work from Home, Remote Working, Hybrid Working Company Onsite / Fun Events Dont forget to include your CV and cover letter. We receive a lot of applications, but we try to notice each of our potential candidates. Location: Gurgaon - NQIND, Gurgaon, Haryana, India Show more Show less
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
nagpur, maharashtra
On-site
You should have a minimum of 3-6 years of experience in network security, with a focus on managing PIM/PAM solutions for at least 3 years. Your responsibilities will include proficiency in managing PIM, working with Windows, Linux, and Unix environments, and hands-on experience in commissioning and implementing PIM/PAM solutions. You will also be integrating these solutions with various management and authentication authorization tools such as email, AD, IAM, and SIEM. Additionally, you should have experience in automating processes using scripting and configuration tools, managing policies and exceptions, and utilizing packet capture, analysis, and troubleshooting tools. Knowledge of PIM/PAM solutions is essential, as well as incident, problem, service request, change, configuration, and capacity management of PIM/PAM setups. You will be responsible for proactively using network monitoring tools to isolate events before service degradation occurs, supporting incident monitoring and analysis/response initiatives, and coordinating with users to ensure timely resolution of trouble tickets. Troubleshooting layers 1, 2, and 3 of the OSI model, as well as network, transport, session, presentation, and application layers, will be part of your daily tasks. Conducting daily performance checks on devices, periodic audits, and compliance checks is also required. You will need to perform immediate troubleshooting for any network outages reported by users or operational personnel. Deploying and maintaining access and security policies for PIM/PAM solutions, as well as implementing and maintaining network security policies, standards, and procedures, will be crucial. Overall, you will be responsible for maintaining service levels and overseeing the day-to-day configuration, administration, and monitoring of the network security infrastructure in a 24/7 environment.,
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
navi mumbai, maharashtra
On-site
You are a highly skilled and dedicated PLM System Administrator with over 4 years of experience, including at least 3-4 years in a full-time PLM System Administrator role. Your expertise lies in PTC Windchill, and you are responsible for ensuring the smooth and efficient operation of Windchill servers. Your key responsibilities include managing system configuration, user and group management, system monitoring and performance tuning, backup and recovery procedures, security and compliance, technical support, PLM implementation and support, server maintenance, and workflow management. You will handle the installation, configuration, and maintenance of the Windchill system, ensuring optimal performance and operational continuity. You will also administer user accounts, roles, permissions, user groups, and access controls while maintaining authentication mechanisms. Proactively monitoring system performance, troubleshooting issues, and optimizing resources to enhance efficiency are crucial aspects of your role. You will implement backup and recovery procedures to ensure data integrity and availability, as well as enforce security policies and compliance with industry regulations. Providing expert technical support to end-users and collaborating with PTC support for issue resolution are essential tasks. Additionally, you will manage the implementation of the PTC Windchill PLM suite, support PLM functionality, and ensure data quality checks for smooth data transfer to the ERP system. Your qualifications include a Bachelor's degree in a relevant field, extensive experience with Windchill environments, and proficiency in PLM concepts. Strong interpersonal, communication, and problem-solving skills are required, along with the ability to prioritize tasks and exercise independent judgment effectively.,
Posted 2 weeks ago
1.0 - 5.0 years
0 Lacs
lucknow, uttar pradesh
On-site
As an Executive in the Human Resources department at Fairfield by Marriott Lucknow, your main responsibility will be to assist in monitoring and tracking employee relations issues, as well as handling and resolving Human Resources issues in collaboration with management and the leadership team. You will be required to ensure compliance with all local, state, and federal laws and company policies during the hiring and recruitment processes. It will be essential to inform Human Resources management of any issues related to employee relations and respond to inquiries and concerns from both employees and management regarding company and Human Resources programs, policies, and guidelines. In this role, you will also be responsible for disseminating information to employees regarding employer-employee relations, employee activities, and personnel policies and programs. Maintaining accurate employee records and files, such as interview documents and I-9's, will be part of your duties. Additionally, you will contribute to the logistics, administration, and scheduling of annual employee surveys and handle phone calls and messages efficiently. Furthermore, you will support management in various HR functions including hiring, training, scheduling, evaluating, counseling, disciplining, and motivating employees. It is crucial to adhere to company, safety, and security policies and procedures, reporting any accidents, injuries, or unsafe work conditions to the manager. Maintaining the confidentiality of proprietary information and providing excellent customer service to all guests according to company standards are also essential aspects of this role. To qualify for this position, you should have a high school diploma or G.E.D. equivalent and at least 1 year of related work experience. Supervisory experience of at least 1 year is preferred, although not mandatory. No specific license or certification is required for this role. At Fairfield by Marriott, we are committed to hiring a diverse workforce and maintaining an inclusive, people-first culture. As part of our team, you will uphold the Fairfield Guarantee, ensuring that every guest leaves the hotel satisfied. Join us in delivering a simple yet exceptional stay experience at over 1,000 locations worldwide. If you are looking to be part of a global team that values high standards and warm hospitality, Fairfield by Marriott offers career opportunities where you can excel, belong, and grow professionally. Embrace the chance to do your best work and become the best version of yourself with our Marriott family farm heritage guiding your journey.,
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
delhi
On-site
As a 5G Security Specialist, your primary focus will be on ensuring the security of 5G infrastructure through robust architectural designs, security control development, and monitoring for 5G-specific threats. You will be tasked with addressing the unique security challenges that arise from 5G technologies. Your responsibilities will include designing, implementing, and maintaining security solutions tailored for 5G networks. This will involve creating a secure network architecture that guarantees the integrity of 5G infrastructure components such as the RAN, Core Network, and Transport Network. You will conduct risk assessments and vulnerability analyses specific to 5G infrastructure, as well as monitor and respond to security incidents in real-time within 5G networks. Collaboration with cross-functional teams will be essential to ensure the secure deployment of 5G technologies. Staying informed about the latest 5G security threats, trends, and mitigation strategies will also be crucial. Additionally, you will need to provide training and guidance to internal teams on best practices for 5G security. Working closely with vendors and partners, you will ensure compliance with security standards and prepare detailed reports and documentation on security assessments and incidents. Implementation of encryption and authentication protocols at various network layers, security controls for network slicing, and intrusion detection/prevention systems for 5G-specific threats like DDoS attacks and MITM attacks will be part of your responsibilities. Conducting security assessments on 5G core elements, developing incident response plans, and performing vulnerability assessments and risk mitigation plans are also key aspects of this role. Your expertise will be crucial in maintaining the security and integrity of 5G networks in the face of evolving security threats and challenges.,
Posted 2 weeks ago
2.0 - 4.0 years
0 Lacs
bengaluru, karnataka, india
On-site
Line of Service Advisory Industry/Sector Not Applicable Specialism Risk Management Level Associate Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisation&aposs security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes forour clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences foreach other. Learn more about us. At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firms growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. Job Description & Summary We seek experienced professionals across levels to join the Emerging Technologies team at PwC in India. Openings are available across Bangalore, Gurgaon, Mumbai, Pune, Chennai, Kochi and Kolkata locations. Join our Emerging Technologies team and collaborate with a global group of diverse and skilled professionals. Youll have the opportunity to work on designing cybersecurity architectures, discovering new cybersecurity technologies for industrial environments, and assisting out clients in understanding the cybersecurity risks associated with smart factories and operational fields. Our clients are market-leading companies in various industries at the international level including energy, manufacturing, utilities hospitality, life sciences, and healthcare. Responsibilities: The experienced resource will be integrated into a work team and responsible for: Manage cybersecurity projects, identifying, evaluating, and designing best in class cybersecurity solutions, demonstrating operational excellence, vision and strategic thinking; Execute complex project activities, coordinate part of the team while supporting Partner and other seniors in managing the client; Face and solve customer cybersecurity technology-driven challenges in innovative and effective way; Leverage on technology to provide innovation, operational excellence and new business model to customers; Engage with internal and external stakeholders, both at the HQ and factory/plant level, to strengthen business relations and create business opportunities; and Manage main activities such as: Maturity and/or Technical Assessment, Secure Architecture & Network Review/Design/Implement. Requirements Minimum 2 years of Cyber Security experience, preferably in a Consulting company or OEMs working in any of the Emerging Technologies like IoT/OT, AI.ML, AR/VR, 5G, Quantum Computing, Edge Computing, Blockchain or Cryptocurrency; Should have worked in ICS environment or telecom networking environment for at least 2 years or minimum 2 years of working experience in IT, cybersecurity or strategy and risk management; Expertise in Secure Architecture & Network Design, Technical Analysis, Solutions Identification and roll-out support; Understanding of cybersecurity frameworks, standards, and guidelines such as ISO 27001, NIST 800-53, NIST 800-82, NIST CSF, ISF CSF, ISA62443, ISO21434, ISO26262 and security regulations ; Good knowledge in the following areas: Cyber Security: NGFW, XDR, SRA, SIEM, ZTNA, SSE and Network Management: Routing, Switching, ACL, Security Policies, VLAN, SD-WAN, VPN, SPAN, STP; Interest in IT, business processes and controls for Emerging Technologies; cybersecurity and relevant regulatory and compliance requirements such as NERC, OSFI cybersecurity self-assessment, or three lines of defense models; Strong interest in IT infrastructure, networks, systems, application and appliances used for monitoring, securing, and responding to cyber incidents and attacks; Passion and curiosity for the cybersecurity industry and technology trends, innovations and frameworks; Be an independent and collaborative person who cooperates in one or more project teams to deliver high quality results; An Undergraduate (or higher) degree in IT related studies: Information Security Management, Risk Management, Computer Science or Engineering or other; Curious and adaptable, strong communication, time management, report writing, investigation, and presentation skills; Strong problem solving, organizational and analytical skills, with the ability to articulate complex concepts in a clear and concise manner; and Fluent knowledge of English language written and verbal. Mandatory Skill Sets: Cybersecurity, Emerging Technologies Preferred Skill Sets: Certiifcations :CISSP, GICSP, ISA 62443, CCNP, PCNSA, PCNSE, LPIC-1, RHCSA Years of Experience Required: 2+ Years Education Qualification: Btech, MBA preferred Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Technology Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills Information Technology General Controls (ITGC) Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Cloud Security, Communication, Conducting Research, Cyber Defense, Cyber Threat Intelligence, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Malware Analysis, Malware Detection Tools, Malware Intelligence Gathering, Malware Research, Malware Reverse Engineering, Malware Sandboxing + 11 more Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship No Government Clearance Required No Job Posting End Date Show more Show less
Posted 2 weeks ago
6.0 - 10.0 years
0 Lacs
noida, uttar pradesh
On-site
You are a passionate and empathetic team player seeking an opportunity with CLOUDSUFI as an Information Security Lead. In this role, you will be responsible for overseeing the organization's information security framework to ensure the confidentiality, integrity, and availability of all data. Your primary duties will include developing and implementing security policies, managing risk assessments, and addressing compliance requirements. As the Infosec Lead, you will lead incident response efforts, conduct security audits, and collaborate with cross-functional teams to mitigate vulnerabilities. Your expertise in cybersecurity tools, frameworks, and best practices will be essential for success in this role. Key Responsibilities: - Work independently with vendors and collaborate with colleagues. - Negotiate remediation timelines and/or remediate found issues independently. - Implement vendor platforms within CI/CD pipelines. - Manage/respond to incidents, collect evidence, and make decisions. - Deploy criteria within WAF and fine-tune configurations based on application needs. - Maintain a high level of concentration on assigned projects and multitask effectively. - Demonstrate resilience and persistence to promote security within the organization. - Define and integrate DevSecOps security requirements in projects. - Articulate security requirements during architecture meetings and collaborate with application and DevOps teams. - Utilize various security tools and techniques, including Trivy, Prowler, Port53, Snyk, KaliDiscovery, and more. Preferred Certification: - AWS Security / CISSP / CISM (Certified Information Security Manager) Required Experience: - 8+ years of experience with AWS orchestration via Terraform scripts. - Proficiency in AWS services such as CloudWatch, CloudTrail, GuardDuty, and WAF. - Experience with Cloudflare or any other WAF tool, Datadog, Trivy, Prowler, Snyk, and other security tools. - Familiarity with compliance regimes like PCI, SOC2, SOX, and HIPAA. - Expertise in Infrastructure as Code tools like Ansible, Terraform, and CloudFormation. - Strong experience implementing security tools within CI/CD pipelines. - Skilled in cloud service providers, particularly AWS. - Ability to oversee technological upgrades and improve cloud security environments. - Proven leadership in developing security strategies, overseeing audits, and maintaining security policies. Non-Technical/ Behavioral Competencies: - Experience working with large customers in the Middle East region, particularly Saudi Arabia. - Strong written communication, technical articulation, listening, and presentation skills. - Conflict management, persuasive, and negotiation skills. - Effective task prioritization, time management, and stakeholder management abilities. - Quick learner, self-starter, go-getter, and team player. - Experience working under stringent deadlines in a Matrix organization structure.,
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |