Home
Jobs

2880 Siem Jobs - Page 5

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

Job Title SOC Analyst Level 1 (24/7 Rotational Shifts) Location Thane (In Office) Must be able to work night shifts and weekends on rotation. About Company We are a risk-driven cybersecurity firm that empowers businesses to grow securely. We deliver MSSP, threat-hunting, incident response, and advisory services across IT, OT, and cloud environments. Join our Security Operations Center (SOC) and help us protect organizations and sleep schedules around the globe. Role Purpose As a Level 1 SOC Analyst, you’ll be our first line of defense, monitoring real-time security alerts, performing initial triage, and kicking off incident response. Key Responsibilities Monitor security events from SIEM, EDR, NDR, and cloud platforms Perform initial triage and analysis of alerts to determine severity and impact Escalate validated incidents to L2/L3 teams as per defined SOPs and playbooks Assist in the containment of low-level threats (e.g., isolate endpoints, disable accounts) Enrich alerts with relevant threat intelligence and context Document incidents, investigations, and actions taken in ticketing systems Prepare daily shift reports and ensure accurate handovers Collaborate with team members during incident investigations Identify false positives and suggest rule tuning where necessary Participate in regular SOC drills and knowledge-sharing sessions Must-Have Qualifications 2-3 years of experience in a SOC, NOC, help desk, or IT security role Fundamental understanding of TCP/IP, Windows/Linux OS internals, and common attack vectors Familiarity with at least one SIEM platform (Splunk, QRadar, Elastic, etc.) Knowledge of MITRE ATT&CK and the incident response lifecycle Strong analytical mindset and a passion for “finding the needle before the haystack burns” Excellent written & verbal English communication skills Ability to work 247 rotating shifts (including nights, weekends, and public holidays) Nice-to-Have Extras CompTIA Security+, CEH, or equivalent entry-level cert Hands-on with SOAR playbooks, EDR (CrowdStrike, SentinelOne), or cloud security tools (AWS GuardDuty, Azure Sentinel) Scripting in Python/PowerShell for automation Experience in malware triage or phishing analysis What We Offer Competitive salary + night-shift allowances Access to our cyber-range and gamified red vs. blue exercises A collaborative culture where every alert you close saves someone’s day (and maybe their job) Reporting Line Reports to: SOC Manager – Operations Works closely with: L2 / L3 Analysts, Threat Intel, Incident Response, DevSecOps Teams Package: 4-5 Lacs P.A Location: Solus Offices, Hiranandani Estate, Thane, Mumbai. Contact on WhatsApp: 859 1211 600 Show more Show less

Posted 2 days ago

Apply

2.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Accenture MxDR Ops Security Engineering Good to have skills : NA Minimum 2 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Summary: As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. Your typical day will involve collaborating with various teams to implement security measures, conducting assessments to identify vulnerabilities, and ensuring that the organization's information and infrastructure are safeguarded against potential cyber threats. You will also engage in continuous learning to stay updated on the latest security trends and technologies, contributing to a secure environment for all stakeholders. Roles & Responsibilities: Work as part of Security Engineering handling tunings, customer requests, escalations, reporting, trainings. Administration of the Accenture proprietary SIEM to gather security logs from customer environment. Life cycle management of the SIEM Adhering to SOPs and notify customers on log flow/log format issues Document best practices and writing KB articles Identify opportunities for process improvements Professional & Technical Skills: Experience in SOC Operations Knowledge on networking, Linux and security concepts Experience in configuring/managing security controls such as Firewall, DS/IPS, EDR, UTM, Proxy Knowledge on log collection mechanism such as Syslog, Log file, DB & API and build collector Knowledge in device onboarding and integration Passion for cyber security, learning, and knowledge sharing Strong Verbal & written communication skills Proven customer service skills, problem solving and interpersonal skills Ability to handle high pressure situations Consistently exhibit high levels of teamwork Additional Information: Work as part of a global technical services team that works 24/7 on rotational shift The candidate should have minimum 2 years of experience in Accenture MxDR Ops Security Engineering. This position is based at our Chennai office. A 15 years full time education is required. Show more Show less

Posted 2 days ago

Apply

0 years

0 Lacs

Gurgaon, Haryana, India

On-site

Linkedin logo

About Gartner Information Security We are a dedicated team of passionate information security professionals committed to protecting, detecting, and responding to threats. Our team comprises lifelong learners who continually research innovative methods to stay ahead of emerging threats. We foster a collaborative environment where ideas are valued, regardless of whether they come from our most experienced members or our newest recruits. We embrace an inclusive culture that encourages diverse perspectives and promotes mutual respect and teamwork. About The Role Gartner is seeking a motivated Security Analyst to join its Security Operations Team. In this role, you will support Incident Response and Investigations, enhance our capabilities, and defend our network and intellectual properties. Your contributions will be instrumental in safeguarding our assets and strengthening our security operations. What You Will Need Experience in conducting analysis and investigation of cybersecurity incidents. Familiarity with SIEM or XDR for log analysis and alert creation. Basic experience with security tools such as EDR, web proxy, WAF, and email security tools. Exposure to cloud environments (AWS, Azure, GCP). Experience in Digital Forensics and Incident Response (DFIR). Ability to query using languages such as SPL, SQL, KQL. Strong communication and prioritization skills. Willingness to learn automation and coding solutions for repetitive tasks (Python, PowerShell, Bash). What You Will Do Investigate and resolve security events and incidents from triage to remediation. Collaborate with stakeholders to identify, respond to, and remediate security issues. Develop innovative detection content aligned with ATT&CK, Cyber Kill Chain, and other frameworks. Contribute ideas and solutions to a dynamic, growth-focused team. Build and implement tools to automate security monitoring and tasks. Develop solutions to quickly and efficiently mitigate security vulnerabilities. Hunt for misconfigurations, anomalous activity, and threats. Bring your own ideas and solutions to a fast-paced, growing, and evolving team focused on operational excellence. Provide rotational on-call support for weekend emergencies (infrequently), ensuring uninterrupted security coverage and prompt incident response Effectively collaborate with team members spread across multiple geographies, ensuring seamless communication and coordination for successful outcomes Who You Are 2+ yrs. of demonstrated experience triaging, investigating, and remediating security events and incidents Bachelor’s degree in cyber security, computer science, or a related professional qualification. Passionate about security and addressing future challenges. Willingness to embrace new technology platforms. Excellent team player Innovation mindset: Seizes opportunities to enhance existing processes and prioritizes automation. Certifications like GCIH, GCFA or equivalent are a plus Capable of working proactively in a time-sensitive operational environment. Don’t meet every single requirement? We encourage you to apply anyway. You might just be the right candidate for this, or other roles. Who are we? At Gartner, Inc. (NYSE:IT), we guide the leaders who shape the world. Our mission relies on expert analysis and bold ideas to deliver actionable, objective insight, helping enterprise leaders and their teams succeed with their mission-critical priorities. Since our founding in 1979, we’ve grown to more than 21,000 associates globally who support ~14,000 client enterprises in ~90 countries and territories. We do important, interesting and substantive work that matters. That’s why we hire associates with the intellectual curiosity, energy and drive to want to make a difference. The bar is unapologetically high. So is the impact you can have here. What makes Gartner a great place to work? Our sustained success creates limitless opportunities for you to grow professionally and flourish personally. We have a vast, virtually untapped market potential ahead of us, providing you with an exciting trajectory long into the future. How far you go is driven by your passion and performance. We hire remarkable people who collaborate and win as a team. Together, our singular, unifying goal is to deliver results for our clients. Our teams are inclusive and composed of individuals from different geographies, cultures, religions, ethnicities, races, genders, sexual orientations, abilities and generations. We invest in great leaders who bring out the best in you and the company, enabling us to multiply our impact and results. This is why, year after year, we are recognized worldwide as a great place to work . What do we offer? Gartner offers world-class benefits, highly competitive compensation and disproportionate rewards for top performers. In our hybrid work environment, we provide the flexibility and support for you to thrive — working virtually when it's productive to do so and getting together with colleagues in a vibrant community that is purposeful, engaging and inspiring. Ready to grow your career with Gartner? Join us. The policy of Gartner is to provide equal employment opportunities to all applicants and employees without regard to race, color, creed, religion, sex, sexual orientation, gender identity, marital status, citizenship status, age, national origin, ancestry, disability, veteran status, or any other legally protected status and to seek to advance the principles of equal employment opportunity. Gartner is committed to being an Equal Opportunity Employer and offers opportunities to all job seekers, including job seekers with disabilities. If you are a qualified individual with a disability or a disabled veteran, you may request a reasonable accommodation if you are unable or limited in your ability to use or access the Company’s career webpage as a result of your disability. You may request reasonable accommodations by calling Human Resources at +1 (203) 964-0096 or by sending an email to ApplicantAccommodations@gartner.com . Job Requisition ID:100031 By submitting your information and application, you confirm that you have read and agree to the country or regional recruitment notice linked below applicable to your place of residence. Gartner Applicant Privacy Link: https://jobs.gartner.com/applicant-privacy-policy For efficient navigation through the application, please only use the back button within the application, not the back arrow within your browser. Show more Show less

Posted 2 days ago

Apply

5.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. Role**: SOC/SIEM Admin Experience Range: 5+ years We are currently planning to do a Walk-In Interview at below locations : Date – 21st June 2025 (Saturday) Hyderabad - TCS Synergy Park Phase1, Premises No 2-56/1/36, Gachibowli, Opposite IIIT Hyderabad Campus, Seri Lingampally, RR District, Hyderabad, Telangana 500019 Chennai - TCS Siruseri ATL Building- 1/G1, SIPCOT IT Park Navalur, Siruseri, Tamil Nadu 603103 Job Description Role & Responsibilities: Monitor multiple security technologies such as SIEM, Antivirus, Vulnerability management, Web Proxy, Security Patch management. Tune/Create SIEM correlation rules. Perform in-depth incident and event analysis. Respond and handle the security incidents. Agree and align on reporting and monitoring requirements with business stakeholders. Conduct research on emerging security threats. Modify Standard Operating Procedures (SOPs) and training documentation. Coach junior team members. Good Knowledge on SIEM tools like QROC, Arcsight, SPLUNK or Sentinel. Knowledge and experience with PCs, LAN topologies, routers, hubs, and terminal servers Knowledge of security applications such as IDS, Security Event Management and anomaly detection tools. Knowledge of VPN technology. Knowledge of investigation tools like FTK imager, memory dump, threat analysis tools. Ability to read and interpret network diagrams. Show more Show less

Posted 2 days ago

Apply

5.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

Are you insatiably curious and do you lean into uncertainty, take risks, and learn quickly from Are you passionate about cybersecurity? Do you enjoy working on a high-performing, fast-paced sales team? Are you insatiably curious and do you lean into uncertainty, take risks, and learn quickly from your mistakes? If so, we are looking for you! The Microsoft Security organization’s mission of making the world a safer place has never been more important. As threats become more frequent and sophisticated, we should work to keep our customers safe through our Security Solutions. The Solution Specialist Unit team within the Microsoft Security organization is at the forefront of this effort, engaging directly with customers to contribute to their success. With thousands of global security experts worldwide, $1 billion+ invested annually in security research and development, and the cutting edge AI- based Security innovations, Microsoft is ideally placed to think outside of the box and protecting customers, and partners around the world. We are looking for passionate, experienced, and credible Security Solution Engineer with a drive to help solve complex security challenges for our customers, enabling them to help modernize their security architecture and posture. We are keen to hear your thoughts on how we can further achieve our purpose. Join our team and discover unique opportunities to grow, develop and learn. As a Security Solution Engineer , you will be a senior technical sales leader and trusted customer advisor, working with cutting-edge security technologies such as Microsoft M365 Defender, Defender for Cloud and Sentinel. You will lead a virtual team of other internal, partner and consulting resources to help map Microsoft solutions to customer security challenges and priorities, demonstrate and prove our solutions, and win the technical decision enabling the team to achieve and even exceed quarterly and annual revenue targets. You will spend 75% of your work hours a week on qualified customer work – planning and orchestration, preparation, meetings (technical presentations, demos, POCs, compete positioning, workshops, etc.), while the other 25% of your time will be focused on further growing your technical, industry and competition acumen. Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. Responsibilities You will be the primary technical point of contact for potential customers during the sales process, owning and driving technical win for security opportunities. Deep technical understanding of cloud security architectures, solutions/technologies including Microsoft M365 Defender, Defender for cloud and Sentinel. Coordinate weekly with sellers and manager to understand opportunities, compete scenarios and engagements to focus on, engaging and driving to own and win the technical decisions Remediate blockers; leads and ensures technical wins for Microsoft Security and adjacent technologies. Engages with and reaches out to customers proactively and independently; builds credibility with customers as a trusted advisor for Microsoft Security; and searches for and uses Microsoft Security customer references; and drives customer intent to buy and facilitates handoff to customer success for post sales deployment. Develop strategies and recommendations to improve the client's security posture, shapes technical win plan and tailors Microsoft messaging to audience for security opportunities. Enhances team capabilities for extended detection and response (XDR), zero trust and cloud security and develops differentiated compete strategies for Microsoft Security for assigned customers. Lead technical presentations, demonstrations, workshops, architecture design sessions, explain, demonstrate, and architect the solution to help solve customer security challenges and priorities. Demonstrates and oversees proof of concepts, presents and applies architecture patterns, proves capabilities and integration into customer environment, and drives cross-workload support for Microsoft solutions for security. Leverages insights and coaches' teams to align new or changing technology to customer security needs. This would mean hands on knowledge on product stack, ability to conduct PoC and pilot by themselves when needed. A technical specialist is responsible for engaging with other teams within and outside the organization throughout the sales cycle. Engaging partners in sell-with scenarios and supporting their technical capabilities is key to scaling solution delivery. You will stay sharp, share your knowledge and best practices enabling further scale and growth for the security business. You would spend 20% of your work hours maintaining deep theoretical and experiential technical knowledge of MS security solutions, competitive landscape and industry trends. As a technical specialist you would document and share best practices and learning with others enabling and contributing to the success of others on your team Share knowledge and learnings with partners to drive the sale, deployment, and adoption of Microsoft solutions. Completes required training and obtains relevant product and role certifications aligned to the role and workload/industry. Other Embody our culture and values Qualifications 5+ years of Security Technology pre-sales or Security Technology consulting experience. OR Bachelor's Degree in Computer Science, Information Technology, or related field AND 4+ years of technical pre-sales or technical consulting experience. OR Master's Degree in Computer Science, Information Technology, or related field AND 3+ years of technical pre-sales or technical consulting experience OR equivalent experience. Experience with Microsoft security solutions (M365 Defender, Defender for Cloud, Sentinel) or, one or more related technologies such as Prisma Cloud, Crowdstrike, Proofpoint, Splunk, etc. Experience presenting the value of technology solutions and architectures through customer presentations, design sessions, POCs accelerating technical wins. Preferred Qualifications 8+ years technical pre-sales, technical consulting, or technology delivery, or related experience OR equivalent experience. 6+ years experience with cloud and hybrid, or on premises infrastructures, architecture designs, migrations, industry standards, and/or technology management. Certification in relevant technologies or disciplines (e.g., Office 365, Power BI, Azure Architect and Development exams, Cloud Platform Technologies, Information Security, Architecture). Certification in Microsoft 365 Security Administration or Azure Security One or more of Industry certifications such as CISSP, CCSP, iAPP, etc. Hands on technical knowledge of relevant products and solutions, but not limited to: Security Information and Event Management (SIEM) systems Next Gen Web Application Firewalls and Secure Web Gateways. Threat detection technologies Log analysis and Incident Response Cloud security technologies, architectures and concepts such as Zero Trust, cloud security posture management, cloud workload protection, Cloud code security and Cloud infrastructure entitlement management. Cloud Computing: Infrastructure as a service (IaaS), Platform as a Services (PaaS), and Software as a service. Demonstrated knowledge and understanding of one or more cloud security standards and frameworks such as CIS, NIST, CSA, etc. Technical Sales Acumen: Experience presenting the value of technology solutions and architectures through customer presentations, design sessions, POCs accelerating technical wins. Expertise in extended detection and response (XDR), zero trust and cloud security solutions & architectures Professional interpersonal skills, with the ability to present technical information clearly and concisely. Develop and maintain technical expertise: A technical specialist should stay up to date with the latest developments and advancements in security space including new tech, competitors, and internal product and services offerings. Growth Mindset. Experience and passion for learning (technical and professional skills); implementing practices from others; trying, failing, and learning from both successes and failures; sharing practices and knowledge for others’ benefit. Problem Solving: Excellent analytical and problem-solving skills, with the ability to think creatively and develop innovative solutions to technical challenges. Multi-Tasking: Ability to work independently and manage multiple priorities simultaneously. Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations. Show more Show less

Posted 2 days ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Description Some careers shine brighter than others. If you’re looking for a career that will help you stand out, join HSBC and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. HSBC is one of the largest banking and financial services organisations in the world, with operations in 64 countries and territories. We aim to be where the growth is, enabling businesses to thrive and economies to prosper, and, ultimately, helping people to fulfil their hopes and realise their ambitions. We are currently seeking an experienced professional to join our team in the role of Consultant Specialist In this role, you will: Serve as Security Engineer supporting technical operations for critical cybersecurity technologies. Provide end to end administration and production support for cybersecurity tools under Endpoint security, Data Security, Network security, Application Security and SIEM/SOAR. Analyze, investigate, remediate cybersecurity application incidents in operational/production environment. Automate repeated and operational tasks through programming (Perl, Python, PHP, Bash, or PowerShell) or other interfaces. Setup monitoring and event management for cyber security products to help manage availability, reliability, and performance. Perform cybersecurity application installation, upgrades, product hygiene and maintenance. Operate in accordance with ITIL processes such as Change Management process, Incident Management and Problem Management Lead product support transitions on both technical and process front. Identify operational gaps and drive continual service improvement plans for existing processes. Build tool knowledgebase and establish/enhance Standard Operation Procedures (SOP) Work with minimal supervision and conduct activities as a collaborative partner to Cyber Security as well as other lines of business (LOBs) Develop and produce operational metrics such as Change success rate, tool uptime report, Incident ticket volume etc. The role demands weekend support on rotation Requirements To be successful in this role, you should meet the following requirements: Relevant experience in tool administration and support of at least 2 + tools in one or more areas is MUST Endpoint security (CrowdStrike or any EDR solution) Network security (ISE/NAC solutions, Network segmentation, Web proxy solutions) Application security (Nessus/Tenable, Container/Docker security.) Data Security (Industry leading DLP technology such as Symantec DLP) SIEM/SOAR (Splunk ES, Splunk SOAR) Familiarity with Unix & Windows operating system is a MUST. Experience working on Amazon web services (Compute, Storage and Networking) is nice to have. Experience with any one of the script languages such as Perl/PowerShell/Python is desired. Must possess clear oral and written communication skills and be able to clearly articulate complex concepts to broader audience. Excellent analytical and problem-solving skills – ability to get to the root of the problem, assess impact, and develop a resolution plan quickly, leveraging all available resources, is essential. Must take ownership of tasks and demonstrate high degree of responsibility to ensure completion You’ll achieve more when you join HSBC. www.hsbc.com/careers HSBC is committed to building a culture where all employees are valued, respected and opinions count. We take pride in providing a workplace that fosters continuous professional development, flexible working and opportunities to grow within an inclusive and diverse environment. Personal data held by the Bank relating to employment applications will be used in accordance with our Privacy Statement, which is available on our website. Issued by – HSBC Software Development India Show more Show less

Posted 2 days ago

Apply

3.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

Saint-Gobain group through its group company Grindwell Norton Limited has established INDEC - an International Delivery Center in Mumbai to provide IT solutions and services to the groups’ businesses Globally. INDEC is currently organized into INDEC Application Development, INDEC Infrastructure Management and Cyber Security Management. While INDEC Apps specializes in Software application development and maintenance services (ADM), INDEC Infra specializes in monitoring and managing the key IT infrastructure assets of the group deployed globally across 70 countries worldwide. INDEC provides IT Services and Solutions to the Saint-Gobain group through its state-of-the-art delivery centers based at Andheri – East in Mumbai. There are approximately 1200+ associates working in INDEC currently. INDEC Apps provides software application development and maintenance services across a wide spectrum covering SAP, Java, PHP, .Net, CRM, Mobility, Digital, Artificial Intelligence (AI), and Robotic Automation. INDEC Infra on the other hand operates the following service lines: Network Coordination Center (NCC/NOC), Data Center Infrastructure Support, IT Standards, Tools Engineering and Reporting Automation. INDEC Cybersecurity provides 24/7 Security monitoring to detect & react on any suspicious activity in Saint- Gobain. It provides services on vulnerability scanning, web application firewall, endpoint protection, strong authentication, digital certificate, Win 10 MBAM and SFTS support . Key Responsibiitie s:• Evaluate and enhance the performance of SIEM/SOAR systems to ensure optimal threat detection and incident respons e.• Develop and maintain automation scripts and playbooks to streamline incident detection, analysis, and response processes. Leverage SOAR capabilities to reduce manual intervention and improve response time s.• Oversee the day-to-day administration of SIEM/SOAR platforms, ensuring their availability, reliability, and security. Perform regular updates, patches, and configuration change s.• Collaborate with the Incident Response team to ensure seamless integration of detection and response functions. Provide support during security incidents to ensure timely and effective remediatio n.• Work closely with other IT and security teams to develop specific use cases and to enhance the overall security posture of the organization. Share insights and recommendations to improve overall cybersecurity postur e.• Maintain detailed documentation of automation, scripts, and improvemen t.• Manage execution of standard procedures for the administration, content management, change management, version/patch management, and lifecycle management of the SIEM/SOAR platform s.• Manage technical documentation around the content deployed to the SIEM/SOA R.• Manage reports, dashboards, metrics for CyberSOC KPIs and presentation to senior management & other stakeholde rs Qualificat on:• Bachelor's degree in Computer Science, Information Security, EXTC or related fie ld.• Relevant certifications (e.g., CISSP, CCSP, CompTIA Security+) are highly desirab le.• Proven experience (3+ years) working within the Cybersecurity field, with a focus on security platform implementation & administrati on.• Experience with deploying and managing a large SIEM/SOAR environme nt.• Experience with Palo Alto XDR and/or other SIEM platforms like Sentinel, Qradar, Splunk, ArcSight, e tc.• Experience with Palo Alto XSOAR and/or equivalent SOAR Platforms like Resilient, Phantom, e tc.• Proficiency in scripting languages (e.g., Python, Bash) for automation and customization of security processes is highly desirab le. Functional Skills/Competenc ies:• Has a systematic, disciplined, and analytical approach to problem solv ing.• Excellent ability to think critically under press ure.• Strong communication skills to convey technical concepts clearly to both technical and non- technical stakehold ers.• Willingness to stay updated with evolving cyber threats, technologies, and industry tre nds.• Capacity to work collaboratively with cross-functional teams, developers, and management to implement robust security measu res. SELECTION PRO CESS:Interested Candidates are mandatorily required to apply through this listing on Jigya. Only applications received through Jigya will be evaluated fur ther.Shortlisted candidates may be required to appear in an Online Assessment administered by Jigya on behalf of Saint-Gobain INDECCandidates selected after the screening test will be interviewed by Saint-Gobain INDEC Show more Show less

Posted 2 days ago

Apply

4.0 - 7.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Technology Risk – Senior As part of our EY- Technology Risk team you will contribute technically to IT Risk and Assurance client engagements and internal projects. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You will also identify potential business opportunities for Ernst & Young within existing engagements and escalate these as appropriate. Similarly, you will anticipate and identify risks within engagements and share any issues with senior members of the team. The opportunity We are looking for a senior to join the Cyber COE group of our EY-Technology Risk Team. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Competencies and Expertise Needed Understanding of Identity and Access Management (IAM) principles, frameworks, and best practices. Strong consulting and advisory skills, capable of understanding and addressing clients’ needs. Hands-on experience with Privileged Access Management (PAM) tools and strategies, including the implementation of solutions like PAM services. In-depth knowledge of identity lifecycle management processes, encompassing user provisioning, de-provisioning, and role management, as demonstrated in various IAM implementation projects. Skilled in analysing security risks associated with identity and access, and formulating effective mitigation strategies, as evidenced by successful project outcomes. Understanding of role-based access control (RBAC), multi-factor authentication (MFA), and single sign-on (SSO) implementations. Interest in working on security compliance projects related to IAM. Experience or interest in leading workshops, trainings, or presentations for clients. Desire to work collaboratively with IT teams to implement IAM and PAM solutions by ensuring seamless integration and operational efficiency. Responsible for ISO 27001 based Information Security Management System implementation and sustenance Assess client information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk Responsible to assist client in review / implement Information Security controls in areas as mentioned, but not limited to: Change management process, Incident management process, Backup process, User identity and access management, Antivirus management, SLA performance and monitoring, Media handling & Exchange of information, Physical and environmental Security, and Media & Information Handling Responsible for conducting clients’ vendors risk assessment and providing a holistic view of client’s risk exposure due to outsourcing Responsible for advising and assisting clients to develop and implement Information classification framework Conduct Information Systems audits covering IT infrastructure assets Serves as technical lead or subject matter specialist on security and privacy implementation projects, responsible for design, build, testing and deployment of solutions Technical Knowledge of Security Capabilities such as, CSPM, EDR, SIEM/SOAR, Vulnerability Management will be a plus. Have a knowledge of cyber security concepts around Vulnerability Management, Identity Management, Risk Management, etc. Good understanding of overall cyber security objective of the organization and having an ability translate data into actionable metrics to drive initiatives to improve cyber security posture. Understanding of Senior stakeholder’s requirements in the organization such CISO, CIO, CRO and ability to communicate with them in an effective manner with excellent verbal and written communication skills. Experienced in conducting information security assessments including business continuity plan audits, network security audits, GenAI Audit, and infrastructure audits. Performed NIST assessments, ISO assessments, and privacy impact audits, Data Privacy and GDPR implementation, experience in developing Data inventory and Third-Party Risk Assessment. Familiar with IT industry frameworks such as ISO27001, ISO42001, NIST, PCI-DSS, TISAX, DSA/DMA, GDPR, NIS2 and HITRUST. Your Key Responsibilities Test and supervise the delivery of assigned controls not limited to ITGC and ITAC but ISO27001 & NIST assessment, Privacy Assessment, Cyber Maturity Assessment, IT Policies Standards Assessment, Software Development Lifecycle (SDLC), System Architecture, Operating Systems, Databases, Networks, Security Systems, Cloud Services, Asset Inventories, Incident Management, Recovery Management and knowledge to intervene and redirect testing as required, resolving, or redirecting escalations as required. Collaborate with your team to manage control owners and other stakeholders, ensuring the success of each assigned reviews, minimising contention where possible and requesting support, where deemed necessary. Apply judgement and risk management concepts to identify, formulate findings and provide valuable insights to the clients to improve processes and manage risks to achieving operational and strategic goals. Review IT Policies and Standards and ensure that they are as per the different industry standard. Stay current with cybersecurity regulations and promote awareness of applicable regulatory standards, upstream risks, and industry best practices across the enterprise. To qualify for the role, you must have. Graduate (CS/ IT, Electronics, Electronics & Telecommunications,)/MBA/M.Sc. with at least 4-7 years of experience. Having industry certification such as CISSP, CISM, CRISC or CISA a strong plus Bring your significant experience in applying relevant technical knowledge in at least one of the following engagements: (a) ISO assessments (b) NIST assessments (c) Data privacy audits (d) Network and Infrastructure audits (e) Cyber Maturity Assessment (f) IT Policies and Standards Assessment (g) IAM and IT Asset Management (h) IT Health Check (i) BCP/DR audit (j) Application security audits. What We Look For A Team of people with commercial acumen, technical experience, and enthusiasm to learn new things in this fast-moving environment Opportunities to work with EY Assurance practices globally with leading businesses across a range of industries. What Working At EY Offers At EY, we are dedicated to helping our clients, from startups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 days ago

Apply

8.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Job Description At Oracle Cloud Infrastructure (OCI) we build the future of the cloud for Enterprises. We act with the speed and attitude of a start-up along with the scale and customer focus of the leading enterprise software company in the world. About the team: The Enterprise Engineering SRE team is tasked with ensuring the security and compliance of internal systems by conducting regular audits, identifying potential gaps in existing standards and proactively improving the organization's overall security posture. The team plays a critical role in safeguarding the integrity, confidentiality and availability of all systems while driving risk management initiatives across departments including disaster recovery planning and execution. We are also responsible for liaising with various internal teams during audits, ensuring data sharing is concise, accurate and aligned for successful audit outcomes. Ideally, the candidate will possess several of the following skills: Supports the strengthening of Oracle’s security posture, focusing on one or more of the following: regulatory compliance; risk management; incident management and response; security policy development and enforcement; Threat and Vulnerability Management; Incident Management and response and similar focus areas. Regulatory Compliance: Brings advanced level skills to manage programs to establish, document and track compliance to industry and government standards and regulations, e.g. ISO-27001, PCI-DSS, HIPAA, FedRAMP, CMMC, GDPR, etc. Researches and interprets current and pending governmental laws and regulations, industry standards and customer and vendor contracts to communicate compliance requirements to the business. Participates in industry forums monitoring developments in regulatory compliance Risk Management: Brings advanced level skills to assess the information security risk associated with existing and proposed business operational programs, systems, applications, practices and procedures in very complex, business-critical environments. Conduct and document very complex information security risk assessments and assist in the creation and implementation of security solutions and programs Cloud Security: In-dept knowledge of cloud security principles and best practices, including securing cloud infrastructure, services, and applications in platforms, OCI experience is a plus Threat and Vulnerability Management: Brings advanced level skills to research, evaluate, track, and manage information security threats and vulnerabilities in situations where in-depth analysis of ambiguous information is required Incident Management and response: Brings advanced level skills to respond to security events and responding in line with Oracle incident response playbooks to mitigate vulnerabilities Mentors and trains other team members Compiles information and reports for management Qualifications: Bachelor’s degree in computer science, Information Security, or a related field. Master's degree preferred 8+ years of experience in information systems, business operations, or related fields, 3+ years of experience in security operations, with a focus on incident detection, response, and vulnerability remediation Relevant certifications such as CISSP, CISM, CISA, or GIAC certifications are preferred Solid understanding of networking protocols, operating systems (Linux, Windows), MiddleTier, Database, cloud computing and end point computing management Excellent communication skills with the ability to effectively communicate technical concepts to both technical and non-technical stakeholders Proven leadership abilities with experience leading security projects and initiatives independently Experience with security tools such as SIEM platforms, intrusion detection/prevention systems, and endpoint security solutions Ability to work independently and collaboratively in a fast-paced environment Strong analytical and problem-solving skills with a keen attention to detail Career Level - IC4 Responsibilities Oversee and manage internal audit processes to ensure adherence to security and compliance standards Act as the primary liaison between internal teams, facilitating effective communication and collaboration to ensure audits are completed efficiently and accurately Assess the effectiveness of security controls and ensure auditing requirements are clearly documented, defined and communicated to necessary teams Ensure the timely and accurate sharing of data across departments to support successful audit outcomes Continuously assess and enhance the organization’s security posture by addressing any identified weaknesses Lead and manage departmental risk management programs, ensuring alignment with broader organizational risk mitigation strategies Facilitate and drive disaster recovery (DR) planning and preparedness across departments to minimize operational disruptions in case of incidents Collaborate with cross-functional teams to establish and maintain robust security policies and procedures, ensuring alignment with industry best practices Make recommendations and provide guidance/consultation regarding process improvements necessary for remediating internal control gaps. Engage with required teams to close the gap Develop and maintain cybersecurity documentation such as the System Security Plan (SSP), Privacy Impact Assessment (PIA), Configuration Management Plan (CMP), Plan of Action and Milestones (POA&M), and Standard Operating Procedures (SOP) as necessary Develop, implement, and maintain industry best practices and regulatory security policies, procedures, and system standards (servers, databases, endpoints, and application design) Engagement in cloud security technologies and protocols, including cloud security architecture, identity and access management, and data protection Write stakeholder reports to explain the assessment, audit results, and recommendations. Create and provide metrics for cybersecurity leadership. Brief executive leadership on compliance matters About Us As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s challenges. We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That’s why we’re committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_mb@oracle.com or by calling +1 888 404 2494 in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law. Show more Show less

Posted 2 days ago

Apply

14.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Description An experienced consulting professional who has a broad understanding of solutions, industry best practices, multiple business processes or technology designs within a product/technology family. Operates independently to provide quality work products to an engagement. Performs varied and complex duties and tasks that need independent judgment, in order to implement Oracle products and technology to meet customer needs. Applies Oracle methodology, company procedures, and leading practices. Position Overview: We are seeking an experienced Senior Principal Consultant – OCI Architect with a strong background in networking, cloud security , and multi-cloud architecture . This role involves designing and implementing advanced OCI (Oracle Cloud Infrastructure) solutions while ensuring best practices in infrastructure security , compliance , and automation . The candidate will play a critical role in delivering solutions for large-scale customer engagements across industries. Key Responsibilities: Cloud Architecture & Implementation Architect and Implement OCI Solutions: Design and deploy scalable, secure, and efficient OCI architectures to meet diverse business requirements. Lead Cloud Migrations: Oversee the transition of workloads from on-premises and other cloud platforms (AWS, Azure, GCP) to OCI, ensuring minimal disruption and optimal performance. Optimize OCI Performance: Design and manage OCI resources including compute, storage, and networking to maximize efficiency and cost optimization. Multi-Cloud Networking & Integration Design and implement multi-cloud network architectures integrating OCI with AWS, Azure, and GCP, ensuring secure, high-performance cross-cloud connectivity. Manage and optimize advanced OCI network components including: Virtual Cloud Networks (VCN) FastConnect, IPSec VPN, Dynamic Routing Gateway (DRG) Load Balancers (Public & Private) DNS management and private endpoints for secure communication Hybrid Cloud Connectivity and Disaster Recovery Security & Compliance Implement and enforce OCI security best practices across multiple layers: Infrastructure Security: Secure OCI resources with Identity and Access Management (IAM), encryption, network segmentation (Security Lists, NSGs), and firewall management. OCI Cloud Security Posture Management: Ensure adherence to CIS OCI Benchmark and automate compliance audits. Security Operations: Manage security monitoring, alerting, and incident response using Cloud Guard and integrated SIEM solutions. Application Security: Ensure secure software deployment practices including vulnerability scanning and automated security testing. Data & Database Security: Design and enforce OCI data protection strategies including encryption (at rest and in transit), Oracle Database security, and data masking. Automation & DevOps Automate cloud provisioning and configuration using Terraform, Ansible, Python, and Shell Scripting. Implement CI/CD pipelines to streamline infrastructure deployment and management. Optimize operational processes by automating security checks and monitoring. Governance & Stakeholder Collaboration Collaborate with cross-functional stakeholders to align OCI solutions with business objectives. Design and implement cloud governance frameworks, ensuring effective monitoring, logging, and policy enforcement. Provide mentorship to technical teams on OCI best practices, ensuring knowledge transfer and technical upskilling. Required Skills & Qualifications: Experience: 14+ years in Cloud Security & Architecture, including at least 3+ years in OCI. Extensive experience with multi-cloud networking—integrating OCI with AWS, Azure, and GCP. Cloud Certifications: OCI Certified Architect Professional or OCI Security Professional (preferred). Technical Expertise: Security: IAM, Policies, Encryption, Security Lists, NSGs, WAF, Cloud Guard, Data & Database Security. Networking: VCN, FastConnect, IPSec VPN, Load Balancers, DNS, DRG, Private Endpoints. Automation & DevOps: Terraform, Ansible, Python, Shell Scripting. Compliance & Governance: CIS OCI Benchmark, Security Posture Management, Audit Logging, Cloud Security Policy enforcement. Multi-Cloud: Strong knowledge of hybrid and multi-cloud networking, including secure connectivity across OCI, AWS, Azure, and GCP. Soft Skills: Strong communication, stakeholder management, and the ability to present complex technical concepts to non-technical audiences. Career Level - IC3 Responsibilities Operates independently to provide quality work products to an engagement. Performs varied and complex duties and tasks that need independent judgment, in order to implement Oracle products and technology to meet customer needs. Applies Oracle methodology, company procedures, and leading practices. Demonstrates expertise to deliver functional and technical solutions on moderately complex customer engagements. May lead the solution design and implementation aspects of engagement(s) ensuring high quality, integrated software solutions within constraints of time and budget. May act as the team lead on projects, providing coaching, guidance and feedback to develop skills of team members. Effectively consults with management of customer organizations. Participates in business development activities. Develops and leads detailed solutions for moderately complex projects. About Us As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s challenges. We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That’s why we’re committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_mb@oracle.com or by calling +1 888 404 2494 in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law. Show more Show less

Posted 2 days ago

Apply

4.0 - 7.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Technology Risk – Senior As part of our EY- Technology Risk team you will contribute technically to IT Risk and Assurance client engagements and internal projects. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You will also identify potential business opportunities for Ernst & Young within existing engagements and escalate these as appropriate. Similarly, you will anticipate and identify risks within engagements and share any issues with senior members of the team. The opportunity We are looking for a senior to join the Cyber COE group of our EY-Technology Risk Team. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Competencies and Expertise Needed Understanding of Identity and Access Management (IAM) principles, frameworks, and best practices. Strong consulting and advisory skills, capable of understanding and addressing clients’ needs. Hands-on experience with Privileged Access Management (PAM) tools and strategies, including the implementation of solutions like PAM services. In-depth knowledge of identity lifecycle management processes, encompassing user provisioning, de-provisioning, and role management, as demonstrated in various IAM implementation projects. Skilled in analysing security risks associated with identity and access, and formulating effective mitigation strategies, as evidenced by successful project outcomes. Understanding of role-based access control (RBAC), multi-factor authentication (MFA), and single sign-on (SSO) implementations. Interest in working on security compliance projects related to IAM. Experience or interest in leading workshops, trainings, or presentations for clients. Desire to work collaboratively with IT teams to implement IAM and PAM solutions by ensuring seamless integration and operational efficiency. Responsible for ISO 27001 based Information Security Management System implementation and sustenance Assess client information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk Responsible to assist client in review / implement Information Security controls in areas as mentioned, but not limited to: Change management process, Incident management process, Backup process, User identity and access management, Antivirus management, SLA performance and monitoring, Media handling & Exchange of information, Physical and environmental Security, and Media & Information Handling Responsible for conducting clients’ vendors risk assessment and providing a holistic view of client’s risk exposure due to outsourcing Responsible for advising and assisting clients to develop and implement Information classification framework Conduct Information Systems audits covering IT infrastructure assets Serves as technical lead or subject matter specialist on security and privacy implementation projects, responsible for design, build, testing and deployment of solutions Technical Knowledge of Security Capabilities such as, CSPM, EDR, SIEM/SOAR, Vulnerability Management will be a plus. Have a knowledge of cyber security concepts around Vulnerability Management, Identity Management, Risk Management, etc. Good understanding of overall cyber security objective of the organization and having an ability translate data into actionable metrics to drive initiatives to improve cyber security posture. Understanding of Senior stakeholder’s requirements in the organization such CISO, CIO, CRO and ability to communicate with them in an effective manner with excellent verbal and written communication skills. Experienced in conducting information security assessments including business continuity plan audits, network security audits, GenAI Audit, and infrastructure audits. Performed NIST assessments, ISO assessments, and privacy impact audits, Data Privacy and GDPR implementation, experience in developing Data inventory and Third-Party Risk Assessment. Familiar with IT industry frameworks such as ISO27001, ISO42001, NIST, PCI-DSS, TISAX, DSA/DMA, GDPR, NIS2 and HITRUST. Your Key Responsibilities Test and supervise the delivery of assigned controls not limited to ITGC and ITAC but ISO27001 & NIST assessment, Privacy Assessment, Cyber Maturity Assessment, IT Policies Standards Assessment, Software Development Lifecycle (SDLC), System Architecture, Operating Systems, Databases, Networks, Security Systems, Cloud Services, Asset Inventories, Incident Management, Recovery Management and knowledge to intervene and redirect testing as required, resolving, or redirecting escalations as required. Collaborate with your team to manage control owners and other stakeholders, ensuring the success of each assigned reviews, minimising contention where possible and requesting support, where deemed necessary. Apply judgement and risk management concepts to identify, formulate findings and provide valuable insights to the clients to improve processes and manage risks to achieving operational and strategic goals. Review IT Policies and Standards and ensure that they are as per the different industry standard. Stay current with cybersecurity regulations and promote awareness of applicable regulatory standards, upstream risks, and industry best practices across the enterprise. To qualify for the role, you must have. Graduate (CS/ IT, Electronics, Electronics & Telecommunications,)/MBA/M.Sc. with at least 4-7 years of experience. Having industry certification such as CISSP, CISM, CRISC or CISA a strong plus Bring your significant experience in applying relevant technical knowledge in at least one of the following engagements: (a) ISO assessments (b) NIST assessments (c) Data privacy audits (d) Network and Infrastructure audits (e) Cyber Maturity Assessment (f) IT Policies and Standards Assessment (g) IAM and IT Asset Management (h) IT Health Check (i) BCP/DR audit (j) Application security audits. What We Look For A Team of people with commercial acumen, technical experience, and enthusiasm to learn new things in this fast-moving environment Opportunities to work with EY Assurance practices globally with leading businesses across a range of industries. What Working At EY Offers At EY, we are dedicated to helping our clients, from startups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 3 days ago

Apply

4.0 - 7.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Technology Risk – Senior As part of our EY- Technology Risk team you will contribute technically to IT Risk and Assurance client engagements and internal projects. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You will also identify potential business opportunities for Ernst & Young within existing engagements and escalate these as appropriate. Similarly, you will anticipate and identify risks within engagements and share any issues with senior members of the team. The opportunity We are looking for a senior to join the Cyber COE group of our EY-Technology Risk Team. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Competencies and Expertise Needed Understanding of Identity and Access Management (IAM) principles, frameworks, and best practices. Strong consulting and advisory skills, capable of understanding and addressing clients’ needs. Hands-on experience with Privileged Access Management (PAM) tools and strategies, including the implementation of solutions like PAM services. In-depth knowledge of identity lifecycle management processes, encompassing user provisioning, de-provisioning, and role management, as demonstrated in various IAM implementation projects. Skilled in analysing security risks associated with identity and access, and formulating effective mitigation strategies, as evidenced by successful project outcomes. Understanding of role-based access control (RBAC), multi-factor authentication (MFA), and single sign-on (SSO) implementations. Interest in working on security compliance projects related to IAM. Experience or interest in leading workshops, trainings, or presentations for clients. Desire to work collaboratively with IT teams to implement IAM and PAM solutions by ensuring seamless integration and operational efficiency. Responsible for ISO 27001 based Information Security Management System implementation and sustenance Assess client information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk Responsible to assist client in review / implement Information Security controls in areas as mentioned, but not limited to: Change management process, Incident management process, Backup process, User identity and access management, Antivirus management, SLA performance and monitoring, Media handling & Exchange of information, Physical and environmental Security, and Media & Information Handling Responsible for conducting clients’ vendors risk assessment and providing a holistic view of client’s risk exposure due to outsourcing Responsible for advising and assisting clients to develop and implement Information classification framework Conduct Information Systems audits covering IT infrastructure assets Serves as technical lead or subject matter specialist on security and privacy implementation projects, responsible for design, build, testing and deployment of solutions Technical Knowledge of Security Capabilities such as, CSPM, EDR, SIEM/SOAR, Vulnerability Management will be a plus. Have a knowledge of cyber security concepts around Vulnerability Management, Identity Management, Risk Management, etc. Good understanding of overall cyber security objective of the organization and having an ability translate data into actionable metrics to drive initiatives to improve cyber security posture. Understanding of Senior stakeholder’s requirements in the organization such CISO, CIO, CRO and ability to communicate with them in an effective manner with excellent verbal and written communication skills. Experienced in conducting information security assessments including business continuity plan audits, network security audits, GenAI Audit, and infrastructure audits. Performed NIST assessments, ISO assessments, and privacy impact audits, Data Privacy and GDPR implementation, experience in developing Data inventory and Third-Party Risk Assessment. Familiar with IT industry frameworks such as ISO27001, ISO42001, NIST, PCI-DSS, TISAX, DSA/DMA, GDPR, NIS2 and HITRUST. Your Key Responsibilities Test and supervise the delivery of assigned controls not limited to ITGC and ITAC but ISO27001 & NIST assessment, Privacy Assessment, Cyber Maturity Assessment, IT Policies Standards Assessment, Software Development Lifecycle (SDLC), System Architecture, Operating Systems, Databases, Networks, Security Systems, Cloud Services, Asset Inventories, Incident Management, Recovery Management and knowledge to intervene and redirect testing as required, resolving, or redirecting escalations as required. Collaborate with your team to manage control owners and other stakeholders, ensuring the success of each assigned reviews, minimising contention where possible and requesting support, where deemed necessary. Apply judgement and risk management concepts to identify, formulate findings and provide valuable insights to the clients to improve processes and manage risks to achieving operational and strategic goals. Review IT Policies and Standards and ensure that they are as per the different industry standard. Stay current with cybersecurity regulations and promote awareness of applicable regulatory standards, upstream risks, and industry best practices across the enterprise. To qualify for the role, you must have. Graduate (CS/ IT, Electronics, Electronics & Telecommunications,)/MBA/M.Sc. with at least 4-7 years of experience. Having industry certification such as CISSP, CISM, CRISC or CISA a strong plus Bring your significant experience in applying relevant technical knowledge in at least one of the following engagements: (a) ISO assessments (b) NIST assessments (c) Data privacy audits (d) Network and Infrastructure audits (e) Cyber Maturity Assessment (f) IT Policies and Standards Assessment (g) IAM and IT Asset Management (h) IT Health Check (i) BCP/DR audit (j) Application security audits. What We Look For A Team of people with commercial acumen, technical experience, and enthusiasm to learn new things in this fast-moving environment Opportunities to work with EY Assurance practices globally with leading businesses across a range of industries. What Working At EY Offers At EY, we are dedicated to helping our clients, from startups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 3 days ago

Apply

4.0 - 7.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Technology Risk – Senior As part of our EY- Technology Risk team you will contribute technically to IT Risk and Assurance client engagements and internal projects. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You will also identify potential business opportunities for Ernst & Young within existing engagements and escalate these as appropriate. Similarly, you will anticipate and identify risks within engagements and share any issues with senior members of the team. The opportunity We are looking for a senior to join the Cyber COE group of our EY-Technology Risk Team. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Competencies and Expertise Needed Understanding of Identity and Access Management (IAM) principles, frameworks, and best practices. Strong consulting and advisory skills, capable of understanding and addressing clients’ needs. Hands-on experience with Privileged Access Management (PAM) tools and strategies, including the implementation of solutions like PAM services. In-depth knowledge of identity lifecycle management processes, encompassing user provisioning, de-provisioning, and role management, as demonstrated in various IAM implementation projects. Skilled in analysing security risks associated with identity and access, and formulating effective mitigation strategies, as evidenced by successful project outcomes. Understanding of role-based access control (RBAC), multi-factor authentication (MFA), and single sign-on (SSO) implementations. Interest in working on security compliance projects related to IAM. Experience or interest in leading workshops, trainings, or presentations for clients. Desire to work collaboratively with IT teams to implement IAM and PAM solutions by ensuring seamless integration and operational efficiency. Responsible for ISO 27001 based Information Security Management System implementation and sustenance Assess client information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk Responsible to assist client in review / implement Information Security controls in areas as mentioned, but not limited to: Change management process, Incident management process, Backup process, User identity and access management, Antivirus management, SLA performance and monitoring, Media handling & Exchange of information, Physical and environmental Security, and Media & Information Handling Responsible for conducting clients’ vendors risk assessment and providing a holistic view of client’s risk exposure due to outsourcing Responsible for advising and assisting clients to develop and implement Information classification framework Conduct Information Systems audits covering IT infrastructure assets Serves as technical lead or subject matter specialist on security and privacy implementation projects, responsible for design, build, testing and deployment of solutions Technical Knowledge of Security Capabilities such as, CSPM, EDR, SIEM/SOAR, Vulnerability Management will be a plus. Have a knowledge of cyber security concepts around Vulnerability Management, Identity Management, Risk Management, etc. Good understanding of overall cyber security objective of the organization and having an ability translate data into actionable metrics to drive initiatives to improve cyber security posture. Understanding of Senior stakeholder’s requirements in the organization such CISO, CIO, CRO and ability to communicate with them in an effective manner with excellent verbal and written communication skills. Experienced in conducting information security assessments including business continuity plan audits, network security audits, GenAI Audit, and infrastructure audits. Performed NIST assessments, ISO assessments, and privacy impact audits, Data Privacy and GDPR implementation, experience in developing Data inventory and Third-Party Risk Assessment. Familiar with IT industry frameworks such as ISO27001, ISO42001, NIST, PCI-DSS, TISAX, DSA/DMA, GDPR, NIS2 and HITRUST. Your Key Responsibilities Test and supervise the delivery of assigned controls not limited to ITGC and ITAC but ISO27001 & NIST assessment, Privacy Assessment, Cyber Maturity Assessment, IT Policies Standards Assessment, Software Development Lifecycle (SDLC), System Architecture, Operating Systems, Databases, Networks, Security Systems, Cloud Services, Asset Inventories, Incident Management, Recovery Management and knowledge to intervene and redirect testing as required, resolving, or redirecting escalations as required. Collaborate with your team to manage control owners and other stakeholders, ensuring the success of each assigned reviews, minimising contention where possible and requesting support, where deemed necessary. Apply judgement and risk management concepts to identify, formulate findings and provide valuable insights to the clients to improve processes and manage risks to achieving operational and strategic goals. Review IT Policies and Standards and ensure that they are as per the different industry standard. Stay current with cybersecurity regulations and promote awareness of applicable regulatory standards, upstream risks, and industry best practices across the enterprise. To qualify for the role, you must have. Graduate (CS/ IT, Electronics, Electronics & Telecommunications,)/MBA/M.Sc. with at least 4-7 years of experience. Having industry certification such as CISSP, CISM, CRISC or CISA a strong plus Bring your significant experience in applying relevant technical knowledge in at least one of the following engagements: (a) ISO assessments (b) NIST assessments (c) Data privacy audits (d) Network and Infrastructure audits (e) Cyber Maturity Assessment (f) IT Policies and Standards Assessment (g) IAM and IT Asset Management (h) IT Health Check (i) BCP/DR audit (j) Application security audits. What We Look For A Team of people with commercial acumen, technical experience, and enthusiasm to learn new things in this fast-moving environment Opportunities to work with EY Assurance practices globally with leading businesses across a range of industries. What Working At EY Offers At EY, we are dedicated to helping our clients, from startups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 3 days ago

Apply

0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Introduction In this role, you'll work in one of our IBM Consulting Client Innovation Centers (Delivery Centers), where we deliver deep technical and industry expertise to a wide range of public and private sector clients around the world. Our delivery centers offer our clients locally based skills and technical expertise to drive innovation and adoption of new technology Your Role And Responsibilities Senior SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This Senior SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis Preferred Education Master's Degree Required Technical And Professional Expertise Senior SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack Preferred Technical And Professional Experience Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred Experience: Experience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures Show more Show less

Posted 3 days ago

Apply

3.0 - 5.0 years

0 Lacs

India

On-site

Linkedin logo

Advanced Technical Support: Provide expert-level support for CyberArk products, including Enterprise Password Vault, Privileged Session Manager, and Central Policy Manager, resolving complex technical issues escalated from Level 1 and Level 2 support teams. Troubleshooting & Root Cause Analysis: Conduct in-depth analysis and troubleshooting of issues within the CyberArk solution, identifying root causes and implementing effective solutions. You will lead investigations into system outages, performance issues, and security incidents, ensuring timely resolution. Implementation & Configuration Assistance: Assist with the deployment, configuration, and integration of new CyberArk features or modules. Provide guidance on best practices, upgrades, and patches. Documentation & Knowledge Sharing: Develop, maintain, and improve technical documentation, troubleshooting guides, and standard operating procedures for CyberArk support processes. Ensure knowledge transfer to junior engineers and documentation of resolutions for recurring issues. Performance Monitoring & Optimization: Monitor the health and performance of the CyberArk environment, identifying areas for improvement, optimization, and ensuring the system meets security and operational standards. Customer Communication: Act as the escalation point for all high-priority CyberArk-related incidents. Communicate effectively with stakeholders, including internal teams and external vendors, to ensure clear updates and timely resolutions. CyberArk Upgrades & Maintenance: Plan and execute CyberArk upgrades and patch management, ensuring minimal disruption to services and compliance with security standards. , Experience: Relevant hands-on experience of 3 to 5 years working with CyberArk PAM solutions. Expertise in CyberArk core components such as the Vault, Central Policy Manager (CPM), Privileged Session Manager (PSM), and Password Vault Web Access (PVWA). Solid understanding of identity and access management (IAM) and privileged access security best practices. Demonstrated experience with troubleshooting, root cause analysis, and resolving complex issues in CyberArk deployments. Technical Skills: Strong understanding of Windows and Linux operating systems, networking protocols, and security technologies. Familiarity with PowerShell, Python, or other scripting languages for automation and troubleshooting. Experience with CyberArk integrations into enterprise applications, SIEM tools, and identity management solutions. Proficiency in directory services such as Active Directory (AD) and LDAP. Certifications: CyberArk Certified Defender. Other relevant certifications (e.g., CISSP, CISM, or similar IAM/security certifications) are a plus. Problem-Solving: Strong analytical and troubleshooting skills, with the ability to work under pressure and manage complex technical issues. Communication: Excellent communication skills, with the ability to interact effectively with both technical and non-technical stakeholders. Ability to document technical processes and write clear knowledge base articles. Show more Show less

Posted 3 days ago

Apply

0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

A career in our Advisory Acceleration Centre is the natural extension of PwC’s leading class global delivery capabilities. We provide premium, cost effective, high quality services that support process quality and delivery capability in support for client engagements. To really stand out and make us fit for the future in a constantly changing world, each and every one of us at PwC needs to be a purpose-led and values-driven leader at every level. To help us achieve this we have the PwC Professional; our global leadership development framework. It gives us a single set of expectations across our lines, geographies and career paths, and provides transparency on the skills we need as individuals to be successful and progress in our careers, now and in the future. Responsibilities As a Senior Associate, you'll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to: Use feedback and reflection to develop self awareness, personal strengths and address development areas. Delegate to others to provide stretch opportunities, coaching them to deliver results. Demonstrate critical thinking and the ability to bring order to unstructured problems. Use a broad range of tools and techniques to extract insights from current industry or sector trends. Review your work and that of others for quality, accuracy and relevance. Know how and when to use tools available for a given situation and can explain the reasons for this choice. Seek and embrace opportunities which give exposure to different situations, environments and perspectives. Use straightforward communication, in a structured way, when influencing and connecting with others. Able to read situations and modify behavior to build quality relationships. Uphold the firm's code of ethics and business conduct. , Cyber Threat & Device Monitoring Analyst (Tier 2) As a Senior Associate, you’ll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. Responsibilities include but are not limited to: Roles & Responsibilities: Monitor and analyze security alerts Respond to escalated security alerts, conduct investigations and client notification Responsible for investigating incidents, analysing attack methods, researching new defense techniques and tools, developing security policy, and documenting procedures Serve as a technical point of escalation and provide mentoring for L1 security analysts Primarily responsible for security monitoring, detection, response and client care Ensure incident identification, assessment, reporting, communication, mitigation and monitoring Ensure compliance to SLA, process adherence and process improvements to achieve operational objectives Maintains SOP, playbook and other documentations up-to-date Prepare reports, summaries, and other forms of communication that may be both internal and client facing Be available for scheduled on-call rotation to respond to escalations outside of regular business hours Revise and develop processes to strengthen the current Security Operations Framework, review policies and highlight the difficulties in managing SLAs Maintain familiarity with industry trends and security best practices Perform threat management, threat modeling, identify threat vectors and develop use cases for security monitoring Coordination with stakeholders, build and maintain positive working relationships with them Experience & Skills: Relevant experience in Information Technology and Information Security Proficient in Incident Management and Response Experience in security device management and multiple SIEM platforms In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management, etc Experience in MSSP environment CISSP and GIAC certifications preferred Knowledge of various operating system flavors including but not limited to Windows, Linux, Unix Knowledge of applications, databases, middleware to address security threats Proficient in preparation of reports, dashboards, and documentation Excellent communication and initiative skills Experience in performing vendor management Ability to handle high pressure situations with key stakeholders Good analytical skills, problem solving and interpersonal skill Fluent in French and English would be an asset A demonstrated commitment to valuing differences and working alongside diverse people and perspective Willing to work in US day shift (9AM EST - 5PM EST) / India night Shift (7 PM IST to 3 AM IST) and weekend support / on call support Show more Show less

Posted 3 days ago

Apply

5.0 - 7.0 years

7 - 8 Lacs

Cochin

On-site

Experience: 5- 7 year(s) Experience in cybersecurity, DevSecOps, or security operations. Knowledge of firewalls, intrusion detection/prevention systems, endpoint protection, and log management. Experience performing security incident response and forensic analysis. Solid experience with CI/CD tools and pipeline security integration. Strong understanding of cloud platforms (AWS, Azure, or GCP) and cloud security best practices. Hands-on experience with security tools: static/dynamic analysis, container scanners, secrets scanners. Experience with scripting languages (Python, Bash, PowerShell) for automation. Familiarity with regulatory standards (SOC2, NIST, PCI-DSS, HIPAA). Integrate security tools and practices into CI/CD pipelines (e.g., GitLab CI, Jenkins, GitHub Actions). Automate security scanning (SAST, DAST, SCA, IaC scanning) and enforce policies in build/deployment stages. Work with development and operations teams to implement security controls in cloud and on-prem environments. Harden infrastructure and container images using tools like Ansible, Packer, Terraform, and Docker. Implement and manage Infrastructure-as-Code (IaC) securely using Terraform, CloudFormation, etc. Monitor, detect, and respond to security events using SIEM (e.g., Splunk, Sentinel, or ELK). Perform vulnerability assessments and coordinate remediation efforts with IT and engineering teams. Support incident response processes and investigations. Bachelor’s degree in engineering discipline such as Computer Science, Cybersecurity, or related field. If you are interested in any of the positions mentioned above, Please attach your updated resume to resume@calpinetech.com with an email explaining the position you are looking for, your career goals and your expected salary. Please indicate the job code in the subject line of your email.

Posted 3 days ago

Apply

3.0 - 5.0 years

4 - 5 Lacs

Thiruvananthapuram

On-site

3 - 5 Years 2 Openings Trivandrum Role description We are seeking a skilled Identity and Security Engineer to design, implement, and manage scalable Identity and Access Management (IAM) solutions across our hybrid enterprise environment. This is a hands-on engineering role that demands a strong grasp of IAM protocols, cloud security, and automation. You will collaborate closely with infrastructure, DevOps, application, and compliance teams to embed identity security as a core pillar of our architecture. Your contributions will play a vital role in protecting users, data, and applications across a complex IT landscape. Key Responsibilities Identity Architecture & Engineering Design and deploy scalable IAM solutions (SSO, MFA, RBAC). Manage identity lifecycle processes (onboarding, offboarding, access reviews). Integrate IAM with cloud platforms (Azure AD, AWS IAM), enterprise systems, and SaaS tools. Security Operations & Automation Develop automation scripts for provisioning, de-provisioning, and access management. Deploy and manage Privileged Access Management (PAM) solutions. Support implementation of Zero Trust Architecture and enforce least-privilege principles. Monitoring, Detection & Incident Response Monitor identity-related events using SIEM and IAM analytics. Investigate and respond to suspicious access patterns and incidents. Perform root cause analysis and recommend security improvements. Compliance & Governance Ensure IAM systems align with compliance frameworks (GDPR, PCI-DSS, ISO 27001). Maintain access logs, audit trails, and documentation. Participate in internal audits, risk assessments, and policy creation. Collaboration & Continuous Improvement Work with DevOps and Security to integrate IAM into CI/CD pipelines. Mentor junior engineers and support knowledge sharing. Stay updated on emerging IAM trends, tools, and threats. Required Qualifications Minimum 5 years of experience in IAM or security engineering roles. Proficiency in IAM protocols (SAML, OAuth2, OpenID Connect, SCIM, LDAP). Hands-on experience with Azure AD, Active Directory, AWS IAM, or GCP IAM. Experience with PAM solutions (CyberArk, BeyondTrust, or HashiCorp Vault). Strong scripting skills (e.g., PowerShell, Python). Solid understanding of Zero Trust principles and identity governance. Preferred Qualifications Relevant certifications (e.g., Microsoft Identity and Access Administrator, CISSP, Azure Security Engineer). Experience in large-scale enterprise or retail IT environments. Familiarity with behavioral identity analytics and Just-In-Time (JIT) access. Exposure to DevSecOps practices and integrating IAM into CI/CD workflows. What We Offer Competitive compensation and performance-based incentives Health, dental, and vision insurance plans Employee wellness and discount programs Certification and professional development support Collaborative and security-first work culture Opportunity to work on impactful projects across digital and retail platforms Skills Identity Access Management,Information Security,Security Monitoring About UST UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to operation. With deep domain expertise and a future-proof philosophy, UST embeds innovation and agility into their clients’ organizations. With over 30,000 employees in 30 countries, UST builds for boundless impact—touching billions of lives in the process.

Posted 3 days ago

Apply

3.0 - 5.0 years

0 Lacs

Cochin

On-site

Job Title: System Administrator / IT Infrastructure Engineer Location: Muscat, Oman Experience Level: 3–5 years Employment Type: Full-Time Salary: ₹40,000 – ₹60,000 per month (INR) Position Overview: We are seeking a skilled and proactive System Administrator / IT Infrastructure Engineer to join our team in Muscat, Oman. The ideal candidate will have hands-on experience in Windows and Linux server environments, virtualization technologies (Hyper-V, VMware), and a solid understanding of Fortinet and Aruba network products. This role involves managing and implementing infrastructure projects, resolving network and system issues, and enhancing security and efficiency across IT environments. Key Responsibilities: · Install, configure, and maintain Windows Server (2016/2019/2022) and Linux (Red Hat, Ubuntu) systems. · Administer and optimize virtualization platforms including VMware vSphere and Microsoft Hyper-V. · Manage and support Active Directory, DNS, DHCP, application, and file servers. · Configure and manage SAN/NAS storage systems (iSCSI, FC protocols). · Install, configure, and troubleshoot network switches and firewalls (Fortinet, Aruba, Palo Alto). · Implement and maintain enterprise wireless networks (Aruba, Fortinet). · Support and administer EDR solutions (e.g., SentinelOne, Trellix, Symantec). · Manage endpoint protection, NAC, and email security systems. · Participate in IT infrastructure upgrades, system patches, and disaster recovery initiatives. · Collaborate with SOC and SIEM teams for security operations and incident resolution. · Maintain system documentation and ensure compliance with security best practices. · Monitor emerging IT threats and proactively suggest improvements. Required Qualifications: · Bachelor’s degree in Computer Science, Information Technology, or related field. · 3–5 years of experience in a similar system/network administration role. · Strong knowledge of TCP/IP, DNS, DHCP, VPN, and network infrastructure. · Experience with virtualization, server management, and enterprise security solutions. Certifications (Preferred/Required): · Microsoft Certified: Windows Server or Azure Administrator Associate · VMware Certified Professional (VCP) · Fortinet NSE Certification · Aruba Certified Switching Associate (ACSA) Why Join Us: · Work on diverse and critical infrastructure and security projects. · Collaborate with a skilled technical team in a fast-paced environment. · Opportunity for certification support and career growth. Job Types: Full-time, Permanent Pay: Up to ₹35,000.00 per month Schedule: Day shift Application Question(s): Do you have a valid passport and are you willing to relocate to Muscat, Oman? How many years of hands-on experience do you have managing Windows and/or Linux servers (e.g., Windows Server 2016/2019/2022, Red Hat, Ubuntu)? Are you experienced with virtualization technologies like VMware vSphere and/or Microsoft Hyper-V? Do you have working experience with Fortinet and/or Aruba network devices (e.g., firewalls, switches, wireless controllers)? Work Location: In person

Posted 3 days ago

Apply

3.0 years

0 Lacs

Cochin

On-site

Job Title: SOAR Engineer (Cortex XSOAR) Location: Muscat, Oman Company: Securado Salary: OMR 600 – OMR 700 per month Job Type: Full-Time | On-Site About the Company: Securado is a leading Managed Security Services Provider (MSSP) based in the Sultanate of Oman. We specialize in delivering advanced cybersecurity solutions across government, enterprise, and critical infrastructure sectors. Our services focus on preventing cyber incidents, ensuring business continuity, and establishing robust security environments through tailored, cost-effective solutions. Position Summary: Securado is seeking an experienced SOAR Engineer with in-depth knowledge of Cortex XSOAR (formerly Demisto), strong scripting capabilities in Python, and a solid background in security operations. The successful candidate will be responsible for building, maintaining, and optimizing automation workflows to enhance our security incident response capabilities. Key Responsibilities: · Design, develop, and maintain automation playbooks and custom integrations within Cortex XSOAR. · Collaborate with SOC analysts and incident responders to identify automation opportunities. · Integrate SOAR with a variety of security tools including SIEM, EDR, firewalls, and threat intelligence platforms. · Optimize and improve existing playbooks to enhance efficiency and reduce response time. · Develop and maintain Python scripts for automation and system integrations. · Ensure all SOAR configurations comply with internal security policies and industry standards. · Contribute to the continuous improvement of detection and response processes through analysis of security incidents. · Document technical configurations, workflows, and procedures. Required Qualifications: · Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent professional experience. · Minimum of 3 years of experience in cybersecurity or security operations. · At least 2 years of hands-on experience with Cortex XSOAR or a similar SOAR platform. · Proficient in Python scripting, including REST API integrations and JSON processing. · Strong understanding of security principles, incident response, threat intelligence, and MITRE ATT&CK framework. · Experience with SIEM platforms, EDR, firewalls, and ticketing systems. · Solid grasp of networking protocols (HTTP, DNS, SMTP) and common cyberattack techniques. Preferred Qualifications: · Cortex XSOAR Certification (such as PCSAE). · Experience with additional scripting tools (PowerShell, Bash). · Familiarity with NIST incident response guidelines. · Understanding of DevOps and CI/CD practices within a security context. What We Offer: · Opportunity to work with a growing cybersecurity leader in the Middle East. · Exposure to complex, real-world security challenges and advanced automation projects. · Supportive, team-oriented work environment. · Competitive compensation package. Job Types: Full-time, Permanent Pay: Up to ₹35,000.00 per month Schedule: Day shift Application Question(s): Do you have a valid passport and are you willing to relocate to Muscat, Oman for this full-time on-site role? How many years of hands-on experience do you have working with Cortex XSOAR (formerly Demisto) or a similar SOAR platform? Are you proficient in Python scripting, including writing automation scripts and integrating with REST APIs? Do you have experience integrating SOAR platforms with other security tools like SIEM, EDR, or firewalls? Work Location: In person

Posted 3 days ago

Apply

5.0 years

0 Lacs

Hyderābād

On-site

We are seeking a highly capable Azure Engineer with a strong software development background and deep expertise in Cloud Back-End (BE) baseline architecture . This role is ideal for someone who can design, build, and manage scalable, secure, and high-performing back-end services in Microsoft Azure. The ideal candidate will have hands-on experience with cloud-native application development, microservices architecture, and infrastructure automation. Key Responsibilities: Design and develop back-end cloud services using Azure-native technologies (App Services, Functions, API Management, Service Bus, Event Grid, etc.). Implement scalable and secure cloud architectures aligned with Azure well-architected framework. Build APIs and microservices leveraging .NET or Node.js or Python, or similar technologies. Ensure cloud back-end performance, reliability, and monitoring using Azure Monitor, App Insights, and Log Analytics. Collaborate with DevOps, security, and front-end teams to ensure seamless integration and CI/CD automation. Define and enforce coding standards, version control, and deployment strategies. Implement and maintain cloud governance, cost optimization, and security best practices. Provide support and troubleshooting for production issues in Azure environments. Required Skills& Experience: 5+ years of professional experience in software development and cloud engineering. Strong development skills in .NET Core or C# or Python or Node.js or Java. Deep expertise in Azure services relevant to back-end architecture (Functions, Key Vault, API Management, Cosmos DB, Azure SQL, etc.) Strong understanding of microservices architecture, containerization (Docker), and Kubernetes(AKS). Hands-on experience with Azure DevOps, GitHub Actions, or similar CI/CD tools. Solid grasp of Azure identity and access management, including RBAC and Managed Identities. Experience with unit testing, integration testing, and automated deployments. About Loginsoft: For over 20 years, leading companies in Telecom, Cybersecurity, Healthcare, Banking, New Media, and more have come to rely on Loginsoft as a trusted resource for technology talent. From startups, to product and enterprises rely on our services. Whether Onsite, Offsite, or Offshore, we deliver. With a track record of successful partnerships with leading technology companies globally, and specifically in the past 6 years with Cybersecurity product companies, Loginsoft offers a comprehensive range of security offerings, including Software Supply Chain, Vulnerability Management, Threat Intelligence, Cloud Security, Cybersecurity Platform Integrations, creating content packs for Cloud SIEM, Logs onboarding and more. Our commitment to innovation and expertise has positioned us as a trusted player in the cybersecurity space. Loginsoft continues to provide traditional IT services which include Software development & Support, QA automation, Data Science& AI, etc. Expertise in Integrations with Threat Intelligence and Security Products: Built more than 200+ integrations with leading TIP, SIEM, SOAR, and Ticketing Platforms such as Cortex XSOAR, Anomali, ThreatQ, Splunk, IBM QRadar& Resilient, Microsoft Azure Sentinel, ServiceNow, Swimlane, Siemplify, MISP, Maltego, Cryptocurrency Digital Exchange Platforms, CISCO, Datadog, Symantec, Carbonblack, F5, Fortinet, and so on. Loginsoft is a partner with industry leading technology vendors Palo Alto, Splunk, Elastic, IBM Security, etc. In addition, Loginsoft offers Research as a service: We're more than just experts in cybersecurity; we're your accredited in-house research team focused on unraveling the complexities of cybersecurity and future technologies. From Application Security to Threat Research, our seasoned professionals have cultivated expertise in every facet of the field. We've earned the trust of over 20 security platform companies, who count on our research and analysis to strengthen their cybersecurity solutions. Job Overview Hyderabad, India 5+ Years Exp Full-Time Position

Posted 3 days ago

Apply

5.0 years

0 Lacs

Hyderābād

On-site

We are looking for a highly skilled DevOps Engineer with hands-on experience managing and deploying Azure Policies in multi-tenant environments. The ideal candidate will have a deep understanding of Azure governance, compliance, and infrastructure automation to help enforce organizational standards and ensure secure, compliant Azure deployments. Key Responsibilities: Design, deploy, and manage Azure Policies, Initiatives, and Blueprints across multiple Azure tenants . Collaborate with Cloud Security, Networking, and Application teams to enforce security, cost, and operational policies. Automate policy compliance monitoring and remediation using Azure Policy, Azure Monitor, and Log Analytics. Integrate policy deployment with CI/CD pipelines using tools like Azure DevOps, GitHub Actions, or Jenkins. Provide governance recommendations and ensure alignment with Azure Well-Architected Framework. Troubleshoot policy conflicts, evaluate policy impact, and support ongoing improvements to the cloud governance model. Maintain documentation and change management for policy lifecycle. Required Skills& Experience: 5+ years of experience in a DevOps Engineering Strong hands-on experience with Azure Tenant environments Hands on Azure Policy, Management Groups, Subscriptions. Solid understanding of Azure governance, security best practices, and policy compliance. Familiarity with CI/CD pipelines and tools (Azure DevOps, GitHub Actions, etc.). Experience working in enterprise Azure environments with multiple tenants/subscriptions. About Loginsoft: For over 20 years, leading companies in Telecom, Cybersecurity, Healthcare, Banking, New Media, and more have come to rely on Loginsoft as a trusted resource for technology talent. From startups, to product and enterprises rely on our services. Whether Onsite, Offsite, or Offshore, we deliver. With a track record of successful partnerships with leading technology companies globally, and specifically in the past 6 years with Cybersecurity product companies, Loginsoft offers a comprehensive range of security offerings, including Software Supply Chain, Vulnerability Management, Threat Intelligence, Cloud Security, Cybersecurity Platform Integrations, creating content packs for Cloud SIEM, Logs onboarding and more. Our commitment to innovation and expertise has positioned us as a trusted player in the cybersecurity space. Loginsoft continues to provide traditional IT services which include Software development & Support, QA automation, Data Science& AI, etc. Expertise in Integrations with Threat Intelligence and Security Products: Built more than 200+ integrations with leading TIP, SIEM, SOAR, and Ticketing Platforms such as Cortex XSOAR, Anomali, ThreatQ, Splunk, IBM QRadar& Resilient, Microsoft Azure Sentinel, ServiceNow, Swimlane, Siemplify, MISP, Maltego, Cryptocurrency Digital Exchange Platforms, CISCO, Datadog, Symantec, Carbonblack, F5, Fortinet, and so on. Loginsoft is a partner with industry leading technology vendors Palo Alto, Splunk, Elastic, IBM Security, etc. In addition, Loginsoft offers Research as a service: We're more than just experts in cybersecurity; we're your accredited in-house research team focused on unraveling the complexities of cybersecurity and future technologies. From Application Security to Threat Research, our seasoned professionals have cultivated expertise in every facet of the field. We've earned the trust of over 20 security platform companies, who count on our research and analysis to strengthen their cybersecurity solutions. Job Overview Hyderabad, India 5+ Years Exp Full-Time Position

Posted 3 days ago

Apply

20.0 years

0 Lacs

Hyderābād

On-site

We are seeking a highly skilled and motivated Cloud Security Engineer with a strong background in security research, operations, and assurance, along with cloud architecture expertise. The role involves implementing security controls, conducting in-depth assessments of cloud services, and identifying secure configurations and misconfigurations across enterprise cloud environments. You will work closely with development, DevOps, and security teams to ensure that cloud infrastructure meets industry and organizational security standards. Key Responsibilities: Implement cloud-native and third-party security controls across AWS, Azure, and/or GCP environments. Conduct detailed security assessments of cloud services (IaaS, PaaS, SaaS) to ensure compliance with internal policies and industry frameworks. Identify and remediate secure misconfigurations and vulnerabilities using automated scanning and manual inspection techniques. Collaborate with cloud architects and security engineers to design and recommend secure infrastructure patterns. Stay updated with evolving cloud threats and vulnerabilities, and contribute to threat modeling and risk assessments. Develop scripts and tools to automate security monitoring and compliance validation. Document findings, remediation guidance, and contribute to security standards development. Required Skill Set: Technical Expertise: Strong knowledge of cloud platforms: AWS, Azure, or GCP Hands-on experience with CSPM (Cloud Security Posture Management) tools and cloud-native security services Deep understanding of IAM, encryption, network security, and data protection within cloud environments Experience with CI/CD security integration and DevSecOps practices Familiarity with security standards such as CIS Benchmarks, NIST, ISO 27001 Security Domains: Security Research: Ability to evaluate and analyze security trends, tools, and techniques Security Operations: Incident detection, log analysis, SIEM tools, and response processes Security Assurance: Risk assessments, compliance audits, and policy enforcement Cloud Architecture: Knowledge of secure cloud design patterns and service integrations Tools & Languages: Tools: Prisma Cloud, Wiz, AWS Security Hub, Azure Defender, GCP Security Command Center Scripting: Python Soft Skills: Strong analytical and problem-solving abilities Excellent verbal and written communication skills Team player with cross-functional collaboration experience Ability to manage priorities in a fast-paced environment About Loginsoft: For over 20 years, leading companies in Telecom, Cybersecurity, Healthcare, Banking, New Media, and more have come to rely on Loginsoft as a trusted resource for technology talent. From startups, to product and enterprises rely on our services. Whether Onsite, Offsite, or Offshore, we deliver. With a track record of successful partnerships with leading technology companies globally, and specifically in the past 6 years with Cybersecurity product companies, Loginsoft offers a comprehensive range of security offerings, including Software Supply Chain, Vulnerability Management, Threat Intelligence, Cloud Security, Cybersecurity Platform Integrations, creating content packs for Cloud SIEM, Logs onboarding and more. Our commitment to innovation and expertise has positioned us as a trusted player in the cybersecurity space. Loginsoft continues to provide traditional IT services which include Software development & Support, QA automation, Data Science& AI, etc. Expertise in Integrations with Threat Intelligence and Security Products: Built more than 200+ integrations with leading TIP, SIEM, SOAR, and Ticketing Platforms such as Cortex XSOAR, Anomali, ThreatQ, Splunk, IBM QRadar& Resilient, Microsoft Azure Sentinel, ServiceNow, Swimlane, Siemplify, MISP, Maltego, Cryptocurrency Digital Exchange Platforms, CISCO, Datadog, Symantec, Carbonblack, F5, Fortinet, and so on. Loginsoft is a partner with industry leading technology vendors Palo Alto, Splunk, Elastic, IBM Security, etc. In addition, Loginsoft offers Research as a service: We're more than just experts in cybersecurity; we're your accredited in-house research team focused on unraveling the complexities of cybersecurity and future technologies. From Application Security to Threat Research, our seasoned professionals have cultivated expertise in every facet of the field. We've earned the trust of over 20 security platform companies, who count on our research and analysis to strengthen their cybersecurity solutions. Job Overview Hyderabad, India 10+ Years Exp Full-Time Position

Posted 3 days ago

Apply

7.0 years

3 - 10 Lacs

Gurgaon

Remote

Job Type: Full Time Job Category: IT Job Description Job Title: Senior Identity Access Management Engineer (PAM Architecture) Job Summary: We are looking for a Senior Identity Access Management Engineer (PAM Architecture) to lead the design of our PAM architecture strategy. This role will also involve contributing to the design and implementation of the PAM platform and its associated tools. Responsibilities: Develop a comprehensive PAM architecture strategy that aligns with organizational objectives and regulatory requirements. Lead the design contribute to the development and deployment of PAM solutions, focusing on workload access controls and secrets management. Contribute to the implementation and management of secrets management solutions ensuring secure storage, access and rotation of privileged credentials. Leverage PAM tools such as CyberArk, HashiCorp Vault, and Microsoft Entra ID to enhance security measures and streamline access management processes. Design PAM policies, standards, and procedures to ensure consistent and secure management of privileged accounts. Ensure PAM practices comply with organizational policies and regulatory requirements. Assess the effectiveness of PAM controls, making data-driven decisions to reduce risk and enhance security posture. Collaborate with technology and business partners to identify and mitigate risks associated with privileged access. Stay current with emerging trends and technologies in PAM and cybersecurity and driving enhancements to existing solutions. Qualifications 7+ years of experience in Privileged Access Management using PAM Solutions like CyberArk/StrongDM as an Architect/SME. Strong industry experience in architecting and designing PAM solutions and deployment across the enterprise. Deep technical understanding of PAM capabilities, controls and security technologies in areas related to identity and access management to address privilege-based risk. Familiarity with regulatory requirements related to PAM, such as PCI DSS, HIPAA, or GDPR. Expertise with build vs. buy solution options. Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, and SIEM solutions. Proficient in Privileged Access Management (PAM) concepts and standard processes, covering privileged account discovery and vaulting, session management, DevOps secret management, and endpoint privilege management. Nice to have: Experience with Python, PowerShell, and Bash. We offer: Culture of Relentless Performance: join an unstoppable technology development team with a 99% project success rate and more than 30% year-over-year revenue growth. Competitive Pay and Benefits: enjoy a comprehensive compensation and benefits package, including health insurance, and a relocation program. Work From Anywhere Culture: make the most of the flexibility that comes with remote work. Growth Mindset: reap the benefits of a range of professional development opportunities, including certification programs, mentorship and talent investment programs, internal mobility and internship opportunities. Global Impact: collaborate on impactful projects for top global clients and shape the future of industries. Welcoming Multicultural Environment: be a part of a dynamic, global team and thrive in an inclusive and supportive work environment with open communication and regular team-building company social events. Social Sustainability Values: join our sustainable business practices focused on five pillars, including IT education, community empowerment, fair operating practices, environmental sustainability, and gender equality. #IdentityAccessManagement #PAMArchitecture #Cybersecurity #ITJobs #SeniorEngineer #PrivilegedAccessManagement #USJobs #InformationTechnology #CyberArk #BeyondTrust #Thycotic #CISSP #CISM #CISA #NIST #GDPR #PCI-DSS Required Skills DevOps Engineer Senior Email Security Engineer

Posted 3 days ago

Apply

4.0 years

10 - 22 Lacs

Bhubaneshwar

On-site

Bhubaneswar, India Job Category : Security Research Posting Date : 01 January 2024 Job Type : Engineering Years of Experience : 5-10 Does this position require a security clearance? No Applicants are required to read,write and speak the following languages Hindi/English Additional Info : Job Description As an esteemed Security Research Engineer with expertise in offensive methodologies and substantiating exploitation, your indispensable role within our security team cannot be understated. Your principal task entails spearheading team exercises to evaluate and enhance our organizational defenses. Moreover, you will partake in team exercises, working alongside the team to strengthen detection prowess and simulate intricate attack scenarios. As part of your role, you will have the responsibility of overseeing and implementing an efficient security strategy, along with security programs and services that are both effective and reliable. Responsibilities Ensure that you remain ahead in the industry by consistently enhancing your understanding of emerging threats, up-to-date attack techniques, and well-documented vulnerabilities. Conduct diverse exercises, including internal and external penetration tests and lateral movement assessments. Evaluate and circumvent security systems to uncover vulnerabilities and propose enhancements. Improve tools for managing configuration or attack paths. Simulate advanced methods and detect different approaches to Tactics, Techniques, and Procedures (TTPs) that could remain unnoticed. Create comprehensive reports that thoroughly document the discoveries, approaches, and applicable suggestions derived from Team engagements. Construct concise and persuasive reports that proficiently convey identified weaknesses, potential attack paths, and potential consequences to relevant parties. Guarantee that reports offer pragmatic advice for rectifying vulnerabilities and improving overall security. Qualifications Bachelor's degree in Computer Science or certifications in Offensive Security such as OSCP, OSCE, or similar qualifications. Minimum of 4 years of experience in a similar role, showcasing a strong background in offensive security and penetration testing. Required Skills Proficient in writing IPS/SIEM detection logic using tools like Splunk or Anvilogic. Hands-on experience in blue team activities with SPL, KQL, YARA-L, and SIGMA. Skilled in crafting detection logic for SIEM or Data Lakes, including Splunk, Anvilogic, etc. Excellent English communication skills, both written and verbal, to effectively communicate complex technical concepts to technical and non-technical stakeholders. Capable of sharing knowledge effectively to educate others. Strong problem-solving abilities and a creative mindset for identifying attack vectors and developing innovative strategies. Disclaimer Hiring Range: from 1000000 to 2250000 per annum. May be eligible for bonus and equity. We maintain broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Nirmalya’s differing products, industries and lines of business. Candidates are typically placed into the range based on the preceding factors as well as internal peer equity. About Us Nirmalya's career has the potential to encompass various industries, roles, countries, and cultures, allowing for growth in novel positions and driving innovation, while effectively balancing work and personal life. Nirmalya has achieved success over the years by embracing change, fostering innovation, and consistently upholding ethical principles, thereby delivering exceptional results for leading companies across multiple industries.To foster and support the talents responsible for such accomplishments, our dedication lies in cultivating an inclusive culture that appreciates and embraces diverse insights and perspectives. We strive to create a workforce that inspires thought leadership and sparks innovation, ensuring a thriving environment for all. Nirmalya Employee Benefits are meticulously designed to prioritize equality, reliability, and affordability. Our comprehensive package encompasses essential features such as Medical and Life Insurance, while also granting access to Retirement Planning and more. Additionally, we actively encourage our employees to actively contribute to the well-being of the communities where we operate. We firmly believe that fostering diversity and inclusion lays the foundation for innovation. To shape a brighter tomorrow, we seek talent from diverse backgrounds, embracing a range of perspectives and abilities. We are committed to providing reasonable accommodations to individuals with disabilities throughout the job application, interview, and prospective role stages, thereby enabling them to effectively perform crucial job functions. Our dedication lies in fostering an inclusive workforce that enables every individual to thrive. We believe in the power of diverse perspectives and value every voice, as it is this harmony that propels us to surpass previous achievements. As an Equal Employment Opportunity Employer, Nirmalya ensures that all applicants are treated fairly and without discrimination. We promote equality regardless of race, color, religion, national origin, gender identity, disability, protected veterans’ status, or any other characteristic protected by law. Additionally, Oracle complies with applicable legislation by considering qualified applicants with arrest and conviction records for employment opportunities. Join our team where diversity is celebrated, and everyone's unique contribution is respected. Together, we embrace innovation and strive towards excellence – a testament to our commitment to fostering an inclusive and thriving workplace.

Posted 3 days ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies