Home
Jobs

3 Security Technologies Jobs

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Saviynt. Experience: 8-10 Years.

Posted 2 weeks ago

Apply

5.0 - 10.0 years

5 - 10 Lacs

Mumbai, Maharashtra, India

On-site

Foundit logo

Roles & Responsibilities: - Collaborate with cross-functional teams to analyze security requirements and design and implement security solutions related to the Saviynt Identity Platform. - Assist in defining requirements, designing and building security components, and testing efforts related to the Saviynt Identity Platform. - Ensure data protection and integrity by implementing security solutions and conducting security testing. - Stay updated with the latest advancements in security technologies and integrate innovative approaches for sustained competitive advantage. Professional & Technical Skills: - Must To Have Skills: Expertise in the Saviynt Identity Platform.Must have good knowledge on Saviynt IGA architecture with hands on experience in application onboarding, connector configurations, implementing workflows, SOD, certifications, custom jars. Ability to troubleshoot and fix the issues within team and also with Saviynt support. - Good To Have Skills: Experience with other Identity and Access Management (IAM) solutions. - Strong understanding of security concepts and technologies, including authentication, authorization, encryption, and firewalls. - Experience with security testing tools and techniques. - Experience in implementing security solutions for enterprise-level applications. - Solid grasp of security standards and regulations, including GDPR, HIPAA, and PCI DSS. Additional Information: - The candidate should have a minimum of 5 years of experience in implementing security solutions for enterprise-level applications using the Saviynt Identity Platform. - The ideal candidate will possess a strong educational background in computer science, information technology, or a related field, along with a proven track record of delivering impactful security solutions.

Posted 2 weeks ago

Apply

5 - 9 years

7 - 11 Lacs

Karnataka

Work from Office

Naukri logo

To implement security controls in software solutions and design security architectures as per agreed specifications. Gather information independently and analyze customer requirements. Work under guidance to interpret the customer requirements. Independently work on Multi vendor Security technologies. Analyse gaps in security Infrastructure. Work in designing, implementing and supporting security products for different customers. Ensure client security standards and processes are met, including client IT Risk Assessment Methodology and security architecture approval. Demonstrate knowledge of industry best practice and market trends relating to network security products and services.

Posted 3 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies