Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
0 years
0 Lacs
Gurugram, Haryana, India
Remote
Functional Description (FD) – Network Security Engineer (Level II) Function Title: Network Security Engineer – Level II Function Category: Network & Security Operations Experience Level: Intermediate Function Purpose: To ensure the integrity, confidentiality, and availability of enterprise networks by managing and securing firewall and intrusion prevention infrastructure. This includes deployment, configuration, monitoring, and optimization of network security appliances such as Palo Alto Networks NGFW, Cisco ASA, and IPS/IDS platforms. Key Functional Responsibilities: 1. Firewall Management: o Configure and manage Palo Alto Networks Next-Gen Firewalls via Panorama. o Administer Cisco ASA firewalls, including rule base updates, NAT configuration, and VPN setup (IPSec/SSL). o Apply firewall best practices to enforce segmentation and threat prevention. 2. Intrusion Prevention: o Operate and fine-tune IPS/IDS systems to detect and block malicious activity. o Analyze IPS logs and correlate with threat intelligence sources. o Work with SOC teams on incident triage and escalation. 3. Security Policy Enforcement: o Maintain and optimize security policies across platforms. o Review firewall and IPS rules regularly for cleanup and compliance. o Participate in change control processes for security configurations. 4. Troubleshooting & Support: o Act as L2 escalation point for network security issues. o Conduct root cause analysis of incidents related to firewall, VPN, or IPS systems. o Support after-hours maintenance or on-call duties as needed. 5. Documentation & Compliance: o Maintain configuration baselines, change logs, and security documentation. o Ensure adherence to NIST, ISO 27001, or internal audit requirements. Required Technical Skills: • Hands-on expertise in Palo Alto NGFWs (Pan-OS, Panorama). • Strong knowledge of Cisco ASA firewall CLI and ASDM. • Experience configuring and supporting VPNs (site-to-site, remote access). • Exposure to IPS technologies (e.g., Snort, Cisco Firepower, Palo Alto Threat Prevention). • Familiarity with networking protocols and troubleshooting (TCP/IP, DNS, HTTP/S, routing protocols). • Comfort with tools like Wireshark, Syslog servers, and firewall rule management tools. Preferred Skills / Good to Have: • Working knowledge of Cisco Firepower/FTD. • Understanding of cloud firewalls (Azure NSG, AWS Security Groups, Palo Alto Prisma). • Scripting or automation skills (Python, Bash). • Knowledge of Zero Trust models and microsegmentation. • Exposure to log management/SIEM tools like Splunk or Elastic
Posted 10 hours ago
10.0 - 15.0 years
5 - 9 Lacs
Bengaluru
Work from Office
We also recognize the importance of closing the 4-million-person cybersecurity talent gap. We aim to create a home for anyone seeking a meaningful future in cybersecurity and look for candidates across industries to join us in soulful work. More at . Role Overview: We are seeking an experienced senior security researcher to help grow our team focusing on generating network content and developing new technologies to identify and block network threats. About the role: Develop network signatures that protect our customers against network-based threats and vulnerabilities Collaborate with the engineering and PM teams to develop new detection enhancements Build and improve tools to automate analysis tasks, simulation software and administer the lab environment to replicate attacks. Analyze network protocols to develop and/or update parsers when needed Publish technical blogs to spread awareness and help defenders with the necessary resources to protect their organizations. Mentor junior members of the team and network attacks About you: A minimum of 10 years of relevant experience is required. A Bachelors degree in Computer Science or equivalent field of study Significant experience with network rule creation like Snort Strong understanding of network protocols and security architectures Highly proficient in any scripting languages such as Python Strong understanding of the attacker landscape and knowledge of MITRE ATT&CK methodologies Experience with software validation/testing Excellent research and analytical skills Strong interpersonal skills and a collaborative work style Proficient in verbal and written communication careers.trellix.com Nice to have Vulnerability analysis experience Development experience to help build/maintain automated tools.
Posted 3 days ago
7.0 - 8.0 years
4 - 8 Lacs
Bengaluru
Work from Office
Job Title: Senior Security Researcher Role Overview: We are seeking an experienced senior security researcher to help grow our team focusing on generating network content and developing new technologies to identify and block network threats. About the role: Develop network signatures that protect our customers against network-based threats and vulnerabilities Collaborate with the engineering and PM teams to develop new detection enhancements Build and improve tools to automate analysis tasks, simulation software and administer the lab environment to replicate attacks. Analyze network protocols to develop and/or update parsers when needed Publish technical blogs to spread awareness and help defenders with the necessary resources to protect their organizations About you: A minimum of 7-8 years of relevant experience is required. A Bachelors degree in Computer Science or equivalent field of study Experience with network rule creation like Snort Strong understanding of network protocols and security architectures Proficient in any scripting languages such as Python Strong understanding of the attacker landscape and knowledge of MITRE ATT&CK methodologies Experience with software validation/testing Excellent research and analytical skills Strong interpersonal skills and a collaborative work style Proficient in verbal and written communication Nice to have: Vulnerability analysis experience Development experience to help build/maintain automated tools careers.trellix.com Machine learning experience
Posted 4 days ago
170.0 years
0 Lacs
Greater Hyderabad Area
On-site
Area(s) of responsibility About Us Birlasoft, a global leader at the forefront of Cloud, AI, and Digital technologies, seamlessly blends domain expertise with enterprise solutions. The company’s consultative and design-thinking approach empowers societies worldwide, enhancing the efficiency and productivity of businesses. As part of the multibillion-dollar diversified CKA Birla Group, Birlasoft with its 12,000+ professionals, is committed to continuing the Group’s 170-year heritage of building sustainable communities. Location -Mumbai ,Pune ,Bangalore, Hyderabad , Noida Exp -8 yrs to 10 yrs About The Role We are seeking a skilled Network Security Engineer to design, implement, and maintain secure network infrastructures. The ideal candidate will possess strong expertise in network protocols, firewall and IDS/IPS configuration, VPN solutions, and security compliance standards. You will be instrumental in enhancing our network security posture through threat detection, risk assessment, and zero trust architecture implementation. Key Responsibilities Design, configure, and manage network security devices including firewalls (Palo Alto, Fortinet, Cisco ASA) and intrusion detection/prevention systems (Snort, Suricata). Implement and manage Network Access Control (NAC) systems utilizing 802.1X, RADIUS, and Cisco ISE for role-based access control. Configure and maintain secure VPN solutions including IPsec, SSL VPNs, and site-to-site tunnels. Conduct SIEM and log analysis using tools such as Splunk, QRadar, and ELK Stack to detect and respond to security threats. Design and enforce network segmentation and apply Zero Trust security principles. Ensure compliance with security standards such as ISO 27001, NIST, PCI-DSS, GDPR, and HIPAA. Perform threat modeling, vulnerability assessments, and risk analysis to mitigate security risks. Collaborate with cross-functional teams to develop and enforce security policies and procedures. Core Technical Competencies Deep understanding of network protocols including TCP/IP, UDP, ICMP, DNS, HTTP/S, FTP. Hands-on experience with firewall and IDS/IPS tools such as Palo Alto, Fortinet, Cisco ASA, Snort, and Suricata. Familiarity with Network Access Control frameworks (802.1X, RADIUS), especially Cisco ISE. Expertise in VPN technologies like IPsec and SSL VPNs. Proficiency in SIEM platforms and log correlation for threat detection and incident response. Knowledge of network segmentation strategies and Zero Trust architecture. Strong understanding of compliance requirements (ISO 27001, NIST, PCI-DSS, GDPR, HIPAA). Ability to conduct threat modeling and risk assessments. Required Certifications CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CEH (Certified Ethical Hacker) CompTIA Security+ CCNP Security (Cisco Certified Network Professional Security) Palo Alto PCNSA/PCNSE Qualifications Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field (or equivalent experience). Proven experience in network security engineering or a similar role. Why Join Us? Work with cutting-edge security technologies. Collaborate with a passionate and dynamic security team. Opportunities for professional growth and certification support.
Posted 4 days ago
4.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
LogiNext is looking for a Principal Engineer - Security to join our team! As a Principal Engineer - Security, you’ll lead the effort to design, implement, operate, support, and maintain the security infrastructure and supporting tools that are necessary to protect internal and external assets on networks that support our corporate infrastructure and applications. You’ll be the SME and primary technical resource for projects, and you’ll facilitate outstanding documentation of the architecture, configurations, processes, maintenance procedures, and service desk support functions. The well qualified candidate will possess the ability to integrate at a high level the knowledge of several areas including network security, IAM, DevSecOps, continuous monitoring, enterprise desktop security, zero-trust architecture principles, security incident remediation, red/blue team exercises, securing multi-cloud and private cloud environments, and more. As we embrace separation of duties, this role will be a critical check and balance that reviews changes in the environment developed by other cybersecurity teams and thereby ensures changes are appropriate and don’t introduce additional risk/liability. This is an extremely unique opportunity and allows an excellent engineer to build the most efficient processes, workflows, and methodologies for implementing, monitoring, managing, and maintaining the most critical components of the entire organization. The engineer chosen for this position should adapt quickly and manage constant change effectively. Responsibilities: Design, implement, and lead the build-out of security infrastructure and tools Function as the SME for security related infrastructure, architecture, and operations Take functional ownership of all security related architecture and design following standards set forth by the enterprise cybersecurity teams Ensure the quality and accuracy of implementations, upgrades, configuration changes, and break/fix activities Assist the Enterprise Cybersecurity teams with hardening initiatives which include monitoring for baseline configuration compliance across all pertinent systems and tools Identify and make recommendations citing strong evidence for material changes in policies, standards, established architecture, and best practices where necessary to further enhance security posture Work closely with application development teams to ensure a successful implementation of DevSecOps complete with automated testing using tools and processes you will create Requirements: Bachelor’s degree in Computer Science, Engineering, Cyber Security, or a directly related field. Education requirements may be replaced with previous related work experience and cyber security certifications (CISSP, CISM, CEH, Azure Security Engineer, etc.) 4 to 14 years working in the Cyber Security At least one professional level technical certification such as CCNP – Security, GIAC certifications, or another industry-recognized security-related certification Experience in SOC II, ISO and VAPT required 3+ years acting as the SME, architect, or principal engineer on large-scale security infrastructure projects Design and implementation experience with tools such as BigFix, InTune, Imperva, Snort, Nessus/Nexpose, and others that are similar Experience designing and implementing Enterprise wide -authentication and identity solutions Experience with Azure AD/Active Directory Single Sign-On (SSO), Multi-Factor Authentication (MFA), Application Registration, Identity Federation, Automation Experience with automation using PowerShell, Python, Bash, etc… Excellent troubleshooting and root cause diagnosis skills Strong writing and communication skills Strong leadership experience and team management skills. Experience creating and maintain accurate and detailed guidelines and procedures Experience with Agile Scrum Methodology and Azure DevOps
Posted 5 days ago
6.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Our vision for the future is based on the idea that transforming financial lives starts by giving our people the freedom to transform their own. We have a flexible work environment, and fluid career paths. We not only encourage but celebrate internal mobility. We also recognize the importance of purpose, well-being, and work-life balance. Within Empower and our communities, we work hard to create a welcoming and inclusive environment, and our associates dedicate thousands of hours to volunteering for causes that matter most to them. Chart your own path and grow your career while helping more customers achieve financial freedom. Empower Yourself. Duties / Responsibilities / Essential Functions Conduct security operations necessary to maintain the confidentiality, availability, and integrity of enterprise data and information systems. Provide excellent customer service for internal and external customers in support of security initiatives, incident response, and support Maintenance of security tools and technologies throughout the enterprise environment Evaluate, design, and implement security related solutions, adhering to established change control processes Provide technical security planning, implementation, configuration, support and troubleshooting services on all security technologies. Provide accurate, clear, and concise documentation of system requirements, specifications, and final builds. Perform all necessary functions associated with the implementation and integration of security tools and platforms into the enterprise environment. Coordinate with systems and network engineers to ensure servers and network devices conform to security standards, and that security devices and controls are working as designed Assist with the development, implementation, and administration of information security policies, standards, and procedures, adhering to industry best practices Assist in defining the security strategy and integrating regulatory compliance requirements (e.g., PCI, GLBA) into the organizational security roadmap Assist in ensuring that the corporate IT environment is secure and complies with all internal and external audit requirements Implement and maintain cryptographic controls (e.g. data at rest, data in transit) in line with security requirements Identify potential security risks, and define and document remediation options or mitigating controls Define and assist in the management of an Incident Response Team that addresses potential or in-progress security events, establishing and adhering to escalation procedures and response times Review and approve submitted application and systems change requests for security compliance Provide subject matter expertise, counsel, and input for enterprise-wide information security initiatives, strategies, projects, and policies Maintain certifications and keep up-to-date with current information technology Participate in 24x7 on-call rotation Perform related duties as requested Education Bachelor s degree in Information Technology, Computer Science, or related field and 6 years experience in information technology or related field within the last 10 years OR 8 years experience in information technology or related field within the last 10 years. Other Preferred Qualifications 4 years of technical experience working with security solutions and conducting security operations 4 years of network security experience and reviewing security tools and solutions and making recommendations on utilization and strategy 4 years of experience with network protocols, data flows and attacks within an IP environment 3+ years of experience in building configurations for security devices and building an automated process to support large-scale deployment Extensive knowledge and experience with security software, firewalls, intrusion detection systems and other security systems and network monitoring. Extensive hands-on technical knowledge of network systems, protocols, and standards such as Ethernet, LAN, WAN and TCP/IP. Experience as a security specialist in a regulated IT environment including some combination of SOX, HIPAA, GLBA, PCI and responsible for compliance and performing/coordinating audits (1+ years) 3+ years of experience with commercial and open source security applications and technologies (e.g. malware prevention, DLP, IDS/IDP, cryptography, vulnerability scanning and penetration testing), as well as related protocols and tools (e.g. SSH, SSL/TLS, snort, port scanners, rootkit detectors, etc.) 2+ years of experience performing network and application security administration, penetration testing and/or threat assessments ISSP, GIAC certification(s) 2+ years programming/scripting experience – one or more of: C, C++, Java, Perl, PHP, Python, shell Competency with Linux/Unix and Windows operating systems and CLI commands Ability to use creative thinking and problem-solving skills, intuition, initiative, and "out of the box" thinking to solve problems quickly 3+ years Cloud (AWS, Azure, Google) Linux/Unix Scripting (Bash, Perl, Python) This job description is not intended to be an exhaustive list of all duties, responsibilities and qualifications of the job. The employer has the right to revise this job description at any time. You will be evaluated in part based on your performance of the responsibilities and/or tasks listed in this job description. You may be required perform other duties that are not included on this job description. The job description is not a contract for employment, and either you or the employer may terminate employment at any time, for any reason, as per terms and conditions of your employment contract. We are an equal opportunity employer with a commitment to diversity. All individuals, regardless of personal characteristics, are encouraged to apply. All qualified applicants will receive consideration for employment without regard to age, race, color, national origin, ancestry, sex, sexual orientation, gender, gender identity, gender expression, marital status, pregnancy, religion, physical or mental disability, military or veteran status, genetic information, or any other status protected by applicable state or local law.
Posted 6 days ago
10.0 - 20.0 years
35 - 45 Lacs
Bengaluru
Hybrid
Role & responsibilities Utilize strong L2/L3 networking skills to test and validate security product features. Conduct thorough testing of security products including SSL, firewall, next-generation firewall, Snort, IPS, IDS, and VPN. Plan and strategize release cycles, test strategies, and test execution plans. Coordinate effectively among various teams to ensure timely releases. Track defects and perform root cause analysis (RCA) to improve product quality. Communicate effectively with cross-border teams and stakeholders to facilitate timely releases. Test various traffic flows and utilize traffic generator tools for comprehensive testing. Guide and mentor engineers to identify and report more bugs. Experience with ASA and FTD is a plus. Good experience in manual testing
Posted 1 week ago
4.0 - 6.0 years
7 - 11 Lacs
Pune
Work from Office
Role Description : As a Senior Network Security Specialist at Incedo, you will be responsible for managing and maintaining client network security. Your duties will include implementing security protocols, monitoring security logs, conducting vulnerability assessments, collaborating with other teams to manage risk, and providing security recommendations. Roles & Responsibilities: Designing and implementing network security strategies. Identifying and mitigating network security threats and vulnerabilities. Configuring and managing security devices such as firewalls and intrusion detection systems. Conducting security audits and assessments. Collaborating with other IT teams to ensure security policies and procedures are implemented. Providing technical support for security-related issues. Maintaining documentation of security configurations and changes. Technical Skills Skills Requirements: Knowledge of network security practices such as access control, intrusion detection, and incident response. Experience in configuring and managing network security devices such as firewalls, VPNs, and IDS/IPS. Familiarity with network security monitoring tools such as Wireshark, Snort, or Bro. Understanding of security frameworks and regulations such as NIST or PCI-DSS. Must have excellent communication skills and be able to communicate complex technical information to non-technical stakeholders in a clear and concise manner. Must understand the company's long-term vision and align with it. Provide leadership, guidance, and support to team members, ensuring the successful completion of tasks, and promoting a positive work environment that fosters collaboration and productivity, taking responsibility of the whole team. Qualifications 4-6 years of work experience in relevant field B.Tech/B.E/M.Tech or MCA degree from a reputed university. Computer science background is preferred
Posted 1 week ago
7.0 - 9.0 years
11 - 16 Lacs
Gurugram
Work from Office
Role Description : As a Technical Lead - Network Security at Incedo, you will be responsible for managing and maintaining client network security. Your duties will include implementing security protocols, monitoring security logs, conducting vulnerability assessments, collaborating with other teams to manage risk, and providing security recommendations. Roles & Responsibilities: Designing and implementing network security strategies. Identifying and mitigating network security threats and vulnerabilities. Configuring and managing security devices such as firewalls and intrusion detection systems. Conducting security audits and assessments. Collaborating with other IT teams to ensure security policies and procedures are implemented. Providing technical support for security-related issues. Maintaining documentation of security configurations and changes. Technical Skills Skills Requirements: Knowledge of network security practices such as access control, intrusion detection, and incident response. Experience in configuring and managing network security devices such as firewalls, VPNs, and IDS/IPS. Familiarity with network security monitoring tools such as Wireshark, Snort, or Bro. Understanding of security frameworks and regulations such as NIST or PCI-DSS. Must have excellent communication skills and be able to communicate complex technical information to non-technical stakeholders in a clear and concise manner. Must understand the company's long-term vision and align with it. Should be open to new ideas and be willing to learn and develop new skills. Should also be able to work well under pressure and manage multiple tasks and priorities. Qualifications 7-9 years of work experience in relevant field B.Tech/B.E/M.Tech or MCA degree from a reputed university. Computer science background is preferred .
Posted 1 week ago
4.0 - 6.0 years
7 - 11 Lacs
Pune
Work from Office
Role Description : As a Senior Network Security Specialist at Incedo, you will be responsible for managing and maintaining client network security. Your duties will include implementing security protocols, monitoring security logs, conducting vulnerability assessments, collaborating with other teams to manage risk, and providing security recommendations. Roles & Responsibilities: Designing and implementing network security strategies. Identifying and mitigating network security threats and vulnerabilities. Configuring and managing security devices such as firewalls and intrusion detection systems. Conducting security audits and assessments. Collaborating with other IT teams to ensure security policies and procedures are implemented. Providing technical support for security-related issues. Maintaining documentation of security configurations and changes. Technical Skills : Knowledge of network security practices such as access control, intrusion detection, and incident response. Experience in configuring and managing network security devices such as firewalls, VPNs, and IDS/IPS. Familiarity with network security monitoring tools such as Wireshark, Snort, or Bro. Understanding of security frameworks and regulations such as NIST or PCI-DSS. Must have excellent communication skills and be able to communicate complex technical information to non-technical stakeholders in a clear and concise manner. Must understand the company's long-term vision and align with it. Provide leadership, guidance, and support to team members, ensuring the successful completion of tasks, and promoting a positive work environment that fosters collaboration and productivity, taking responsibility of the whole team. Qualifications 4-6 years of work experience in relevant field B.Tech/B.E/M.Tech or MCA degree from a reputed university. Computer science background is preferred
Posted 1 week ago
4.0 years
0 Lacs
Gurgaon, Haryana, India
Remote
Do you like working on identifying and preventing potential cybersecurity risks? Are you ready for the next step in your career? Join our Digital Technology Team! Our Digital Technology business provides intelligent, connected technologies to monitor and control our energy extraction assets. We provide customers with the peace of mind needed to reliably and efficiently improve their operations. Our team creates business value through continuous improvement in up-time, resilience, performance, time to market, security and compliance Partner with the best As an Incident Response Analyst you will play a crucial role in safeguarding Baker Hughes information systems by analyzing a wide range of cybersecurity events. Your primary focus will be on identifying, investigating, and interpreting security incidents and trends, and making recommendations on appropriate containment and remediation steps. You will be at the forefront of detecting potential threats and vulnerabilities, providing critical insights that drive our cybersecurity defense strategies. As a Incident Response Analyst you will be Responsible for : Leading technical aspects of digital security incident detection and response, focusing on very unstructured incidents and high-risk events. Specializing in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and/or log-centric analysis (SIEM) Performing daily response operations with a schedule that may involve nontraditional working hours - act as escalation points for Event Triage Analysts Mentoring and train Event Analysts as required. The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role of an incident handler Fuel your passion Bachelor's Degree in Computer Science or “STEM” Majors (Science, Technology, Engineering and Math). A minimum 4 years of professional experience in STEM related degree, Political Science/Government/International Affairs. The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role of an incident handler Strong verbal and written communication skills Detailed understanding of APT, Cyber Crime and other associated tactics Strong track record of understanding and interest in recognized IT and OT security-related standards and technologies, demonstrated through training, job experience and/or industry Knowledge of and/or working on Baker Hughes OT products Professional experience with Cyber Security, Operations Security, Product Security, Industrial Control Systems (ICS), Information Assurance, and Information Technology Experience with host based detection and prevention suites (Microsoft Defender, OSSEC, Yara, MIR, Carbon Black, Tanium, etc.) Experience with host-centric tools for forensic collection and analysis (Microsoft Defender, Sleuth Kit, Volatility Framework, FTK, Encase, etc.) Experience with Network Forensics and/or Network Security Monitoring (NSM) tools (Snort, Bro-IDS, PCAP, tcpdump, etc.) and analysis techniques (alert, flow/session and PCAP analysis) Experience with malware and reverse engineering (Dynamic and static analysis) Strong IT infrastructure background including familiarity with the following: Networking (TCP/IP, UDP, Routing) Applications (HTTP, SMTP, DNS, FTP, SSH, etc.) Encryption (DES, AES, RSA) and hashing algorithms (MD5, SHA-1, etc.) System/Application vulnerabilities and exploitation Operating systems (Windows, *Nix, and Mac) Cloud technology (SaaS, IaaS, PaaS) and associated digital forensics and incident response techniques CISSP, CISM or related SANs certifications preferred Active US government security clearance Working knowledge of secure communication methods, including Secure Shell, S/MIME and PGP/GPG Work in a way that works for you We recognize that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Working flexible hours - flexing the times when you work in the day to help you fit everything in and work when you are the most productive. Occasionally working remotely from home or any other work location Working with us Our people are at the heart of what we do at Baker Hughes. We know we are better when all of our people are developed, engaged and able to bring their whole authentic selves to work. We invest in the health and well-being of our workforce, train and reward talent and develop leaders at all levels to bring out the best in each other. Working for you Our inventions have revolutionized energy for over a century. But to keep going forward tomorrow, we know we have to push the boundaries today. We prioritize rewarding those who embrace change with a package that reflects how much we value their input. Join us, and you can expect: Contemporary work-life balance policies and wellbeing activities Comprehensive private medical care options Safety net of life insurance and disability programs Tailored financial programs Additional elected or voluntary benefits About Us: We are an energy technology company that provides solutions to energy and industrial customers worldwide. Built on a century of experience and conducting business in over 120 countries, our innovative technologies and services are taking energy forward – making it safer, cleaner and more efficient for people and the planet. Join Us: Are you seeking an opportunity to make a real difference in a company that values innovation and progress? Join us and become part of a team of people who will challenge and inspire you! Let’s come together and take energy forward. Baker Hughes Company is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law. R147718
Posted 1 week ago
4.0 years
0 Lacs
Hyderabad, Telangana, India
Remote
Do you like working on identifying and preventing potential cybersecurity risks? Are you ready for the next step in your career? Join our Digital Technology Team! Our Digital Technology business provides intelligent, connected technologies to monitor and control our energy extraction assets. We provide customers with the peace of mind needed to reliably and efficiently improve their operations. Our team creates business value through continuous improvement in up-time, resilience, performance, time to market, security and compliance Partner with the best As an Incident Response Analyst you will play a crucial role in safeguarding Baker Hughes information systems by analyzing a wide range of cybersecurity events. Your primary focus will be on identifying, investigating, and interpreting security incidents and trends, and making recommendations on appropriate containment and remediation steps. You will be at the forefront of detecting potential threats and vulnerabilities, providing critical insights that drive our cybersecurity defense strategies. As a Incident Response Analyst you will be Responsible for : Leading technical aspects of digital security incident detection and response, focusing on very unstructured incidents and high-risk events. Specializing in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and/or log-centric analysis (SIEM) Performing daily response operations with a schedule that may involve nontraditional working hours - act as escalation points for Event Triage Analysts Mentoring and train Event Analysts as required. The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role of an incident handler Fuel your passion Bachelor's Degree in Computer Science or “STEM” Majors (Science, Technology, Engineering and Math). A minimum 4 years of professional experience in STEM related degree, Political Science/Government/International Affairs. The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role of an incident handler Strong verbal and written communication skills Detailed understanding of APT, Cyber Crime and other associated tactics Strong track record of understanding and interest in recognized IT and OT security-related standards and technologies, demonstrated through training, job experience and/or industry Knowledge of and/or working on Baker Hughes OT products Professional experience with Cyber Security, Operations Security, Product Security, Industrial Control Systems (ICS), Information Assurance, and Information Technology Experience with host based detection and prevention suites (Microsoft Defender, OSSEC, Yara, MIR, Carbon Black, Tanium, etc.) Experience with host-centric tools for forensic collection and analysis (Microsoft Defender, Sleuth Kit, Volatility Framework, FTK, Encase, etc.) Experience with Network Forensics and/or Network Security Monitoring (NSM) tools (Snort, Bro-IDS, PCAP, tcpdump, etc.) and analysis techniques (alert, flow/session and PCAP analysis) Experience with malware and reverse engineering (Dynamic and static analysis) Strong IT infrastructure background including familiarity with the following: Networking (TCP/IP, UDP, Routing) Applications (HTTP, SMTP, DNS, FTP, SSH, etc.) Encryption (DES, AES, RSA) and hashing algorithms (MD5, SHA-1, etc.) System/Application vulnerabilities and exploitation Operating systems (Windows, *Nix, and Mac) Cloud technology (SaaS, IaaS, PaaS) and associated digital forensics and incident response techniques CISSP, CISM or related SANs certifications preferred Active US government security clearance Working knowledge of secure communication methods, including Secure Shell, S/MIME and PGP/GPG Work in a way that works for you We recognize that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Working flexible hours - flexing the times when you work in the day to help you fit everything in and work when you are the most productive. Occasionally working remotely from home or any other work location Working with us Our people are at the heart of what we do at Baker Hughes. We know we are better when all of our people are developed, engaged and able to bring their whole authentic selves to work. We invest in the health and well-being of our workforce, train and reward talent and develop leaders at all levels to bring out the best in each other. Working for you Our inventions have revolutionized energy for over a century. But to keep going forward tomorrow, we know we have to push the boundaries today. We prioritize rewarding those who embrace change with a package that reflects how much we value their input. Join us, and you can expect: Contemporary work-life balance policies and wellbeing activities Comprehensive private medical care options Safety net of life insurance and disability programs Tailored financial programs Additional elected or voluntary benefits About Us: We are an energy technology company that provides solutions to energy and industrial customers worldwide. Built on a century of experience and conducting business in over 120 countries, our innovative technologies and services are taking energy forward – making it safer, cleaner and more efficient for people and the planet. Join Us: Are you seeking an opportunity to make a real difference in a company that values innovation and progress? Join us and become part of a team of people who will challenge and inspire you! Let’s come together and take energy forward. Baker Hughes Company is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law. R147718
Posted 1 week ago
4.0 years
0 Lacs
Mumbai, Maharashtra, India
Remote
Do you like working on identifying and preventing potential cybersecurity risks? Are you ready for the next step in your career? Join our Digital Technology Team! Our Digital Technology business provides intelligent, connected technologies to monitor and control our energy extraction assets. We provide customers with the peace of mind needed to reliably and efficiently improve their operations. Our team creates business value through continuous improvement in up-time, resilience, performance, time to market, security and compliance Partner with the best As an Incident Response Analyst you will play a crucial role in safeguarding Baker Hughes information systems by analyzing a wide range of cybersecurity events. Your primary focus will be on identifying, investigating, and interpreting security incidents and trends, and making recommendations on appropriate containment and remediation steps. You will be at the forefront of detecting potential threats and vulnerabilities, providing critical insights that drive our cybersecurity defense strategies. As a Incident Response Analyst you will be Responsible for : Leading technical aspects of digital security incident detection and response, focusing on very unstructured incidents and high-risk events. Specializing in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and/or log-centric analysis (SIEM) Performing daily response operations with a schedule that may involve nontraditional working hours - act as escalation points for Event Triage Analysts Mentoring and train Event Analysts as required. The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role of an incident handler Fuel your passion Bachelor's Degree in Computer Science or “STEM” Majors (Science, Technology, Engineering and Math). A minimum 4 years of professional experience in STEM related degree, Political Science/Government/International Affairs. The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role of an incident handler Strong verbal and written communication skills Detailed understanding of APT, Cyber Crime and other associated tactics Strong track record of understanding and interest in recognized IT and OT security-related standards and technologies, demonstrated through training, job experience and/or industry Knowledge of and/or working on Baker Hughes OT products Professional experience with Cyber Security, Operations Security, Product Security, Industrial Control Systems (ICS), Information Assurance, and Information Technology Experience with host based detection and prevention suites (Microsoft Defender, OSSEC, Yara, MIR, Carbon Black, Tanium, etc.) Experience with host-centric tools for forensic collection and analysis (Microsoft Defender, Sleuth Kit, Volatility Framework, FTK, Encase, etc.) Experience with Network Forensics and/or Network Security Monitoring (NSM) tools (Snort, Bro-IDS, PCAP, tcpdump, etc.) and analysis techniques (alert, flow/session and PCAP analysis) Experience with malware and reverse engineering (Dynamic and static analysis) Strong IT infrastructure background including familiarity with the following: Networking (TCP/IP, UDP, Routing) Applications (HTTP, SMTP, DNS, FTP, SSH, etc.) Encryption (DES, AES, RSA) and hashing algorithms (MD5, SHA-1, etc.) System/Application vulnerabilities and exploitation Operating systems (Windows, *Nix, and Mac) Cloud technology (SaaS, IaaS, PaaS) and associated digital forensics and incident response techniques CISSP, CISM or related SANs certifications preferred Active US government security clearance Working knowledge of secure communication methods, including Secure Shell, S/MIME and PGP/GPG Work in a way that works for you We recognize that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Working flexible hours - flexing the times when you work in the day to help you fit everything in and work when you are the most productive. Occasionally working remotely from home or any other work location Working with us Our people are at the heart of what we do at Baker Hughes. We know we are better when all of our people are developed, engaged and able to bring their whole authentic selves to work. We invest in the health and well-being of our workforce, train and reward talent and develop leaders at all levels to bring out the best in each other. Working for you Our inventions have revolutionized energy for over a century. But to keep going forward tomorrow, we know we have to push the boundaries today. We prioritize rewarding those who embrace change with a package that reflects how much we value their input. Join us, and you can expect: Contemporary work-life balance policies and wellbeing activities Comprehensive private medical care options Safety net of life insurance and disability programs Tailored financial programs Additional elected or voluntary benefits About Us: We are an energy technology company that provides solutions to energy and industrial customers worldwide. Built on a century of experience and conducting business in over 120 countries, our innovative technologies and services are taking energy forward – making it safer, cleaner and more efficient for people and the planet. Join Us: Are you seeking an opportunity to make a real difference in a company that values innovation and progress? Join us and become part of a team of people who will challenge and inspire you! Let’s come together and take energy forward. Baker Hughes Company is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law. R147718
Posted 1 week ago
4.0 years
0 Lacs
Pune, Maharashtra, India
Remote
Do you like working on identifying and preventing potential cybersecurity risks? Are you ready for the next step in your career? Join our Digital Technology Team! Our Digital Technology business provides intelligent, connected technologies to monitor and control our energy extraction assets. We provide customers with the peace of mind needed to reliably and efficiently improve their operations. Our team creates business value through continuous improvement in up-time, resilience, performance, time to market, security and compliance Partner with the best As an Incident Response Analyst you will play a crucial role in safeguarding Baker Hughes information systems by analyzing a wide range of cybersecurity events. Your primary focus will be on identifying, investigating, and interpreting security incidents and trends, and making recommendations on appropriate containment and remediation steps. You will be at the forefront of detecting potential threats and vulnerabilities, providing critical insights that drive our cybersecurity defense strategies. As a Incident Response Analyst you will be Responsible for : Leading technical aspects of digital security incident detection and response, focusing on very unstructured incidents and high-risk events. Specializing in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and/or log-centric analysis (SIEM) Performing daily response operations with a schedule that may involve nontraditional working hours - act as escalation points for Event Triage Analysts Mentoring and train Event Analysts as required. The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role of an incident handler Fuel your passion Bachelor's Degree in Computer Science or “STEM” Majors (Science, Technology, Engineering and Math). A minimum 4 years of professional experience in STEM related degree, Political Science/Government/International Affairs. The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role of an incident handler Strong verbal and written communication skills Detailed understanding of APT, Cyber Crime and other associated tactics Strong track record of understanding and interest in recognized IT and OT security-related standards and technologies, demonstrated through training, job experience and/or industry Knowledge of and/or working on Baker Hughes OT products Professional experience with Cyber Security, Operations Security, Product Security, Industrial Control Systems (ICS), Information Assurance, and Information Technology Experience with host based detection and prevention suites (Microsoft Defender, OSSEC, Yara, MIR, Carbon Black, Tanium, etc.) Experience with host-centric tools for forensic collection and analysis (Microsoft Defender, Sleuth Kit, Volatility Framework, FTK, Encase, etc.) Experience with Network Forensics and/or Network Security Monitoring (NSM) tools (Snort, Bro-IDS, PCAP, tcpdump, etc.) and analysis techniques (alert, flow/session and PCAP analysis) Experience with malware and reverse engineering (Dynamic and static analysis) Strong IT infrastructure background including familiarity with the following: Networking (TCP/IP, UDP, Routing) Applications (HTTP, SMTP, DNS, FTP, SSH, etc.) Encryption (DES, AES, RSA) and hashing algorithms (MD5, SHA-1, etc.) System/Application vulnerabilities and exploitation Operating systems (Windows, *Nix, and Mac) Cloud technology (SaaS, IaaS, PaaS) and associated digital forensics and incident response techniques CISSP, CISM or related SANs certifications preferred Active US government security clearance Working knowledge of secure communication methods, including Secure Shell, S/MIME and PGP/GPG Work in a way that works for you We recognize that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Working flexible hours - flexing the times when you work in the day to help you fit everything in and work when you are the most productive. Occasionally working remotely from home or any other work location Working with us Our people are at the heart of what we do at Baker Hughes. We know we are better when all of our people are developed, engaged and able to bring their whole authentic selves to work. We invest in the health and well-being of our workforce, train and reward talent and develop leaders at all levels to bring out the best in each other. Working for you Our inventions have revolutionized energy for over a century. But to keep going forward tomorrow, we know we have to push the boundaries today. We prioritize rewarding those who embrace change with a package that reflects how much we value their input. Join us, and you can expect: Contemporary work-life balance policies and wellbeing activities Comprehensive private medical care options Safety net of life insurance and disability programs Tailored financial programs Additional elected or voluntary benefits About Us: We are an energy technology company that provides solutions to energy and industrial customers worldwide. Built on a century of experience and conducting business in over 120 countries, our innovative technologies and services are taking energy forward – making it safer, cleaner and more efficient for people and the planet. Join Us: Are you seeking an opportunity to make a real difference in a company that values innovation and progress? Join us and become part of a team of people who will challenge and inspire you! Let’s come together and take energy forward. Baker Hughes Company is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law. R147718
Posted 1 week ago
3.0 - 5.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Our growth plans: We process close to 4% of the country's freight on our software platform. Our goal is to get to 20% of the country's freight by 2028. This gives us a bird’s eye view of the market. We’re already the largest road freight technology platform in the country and we plan to build on this base to drive growth in software, freight marketplace and supply chain financing to get to a 100M USD revenue by 2028. About the Role: Cyber Security Engineer plays a pivotal role in safeguarding Freight Tiger’s Application & Cloud infrastructure assets and information. Key responsibilities: Lead the efforts towards development and implementation of cyber security architecture for Freight Tiger’s application and cloud infrastructure. Conduct regular vulnerability assessments to identify and mitigate potential security risks in applications and perform penetration testing to simulate cyber-attacks and identify weaknesses in the cloud infrastructure. Work and coordinate with engineering teams to fix security vulnerabilities & bugs and integrate security measures into the development lifecycle to ensure security is considered in all stages of software and system development. Lead incident response plans to address security incidents and investigate security breaches and provide detailed reports on root causes and recommended actions. Conduct cybersecurity best practices and awareness training campaigns across the organization. Plan and implement solutions to monitor network traffic and end user computing devices for unusual activities and potential security threats. Participate in regular security audits to assess compliance with security standards. Preferred qualifications: Graduation or higher, preferably in CS or relevant stream. CEH or similar industry certification. 3 - 5 years of relevant experience conducting security and vulnerability assessment of Applications and cloud infrastructure. Product Expertise: Strong experience with leading security assessment tools like Burp Suite, Metasploit, Wireshark, Snort and Nmap etc. Hands-on exposure of working with AWS environment including the security services like IAM, Guard Duty, CloudTrail, WAF, Shield etc. Exposure of participation in the audit process, preferably for PCI-DSS, ISO 2701, SOC II etc. Strong attention to detail with an analytical mind and outstanding problem-solving skills. Great awareness of cybersecurity trends and hacking techniques.
Posted 1 week ago
3.0 - 5.0 years
5 - 9 Lacs
Pune
Work from Office
Role Description As a Software Engineer - Network Security at Incedo, you will be responsible for managing and maintaining client network security. Your duties will include implementing security protocols, monitoring security logs, conducting vulnerability assessments, collaborating with other teams to manage risk, and providing security recommendations. Roles & Responsibilities: Designing and implementing network security strategies. Identifying and mitigating network security threats and vulnerabilities. Configuring and managing security devices such as firewalls and intrusion detection systems. Conducting security audits and assessments. Collaborating with other IT teams to ensure security policies and procedures are implemented. Providing technical support for security-related issues. Maintaining documentation of security configurations and changes. Technical Skills Skills Requirements: Knowledge of network security practices such as access control, intrusion detection, and incident response. Experience in configuring and managing network security devices such as firewalls, VPNs, and IDS/IPS. Familiarity with network security monitoring tools such as Wireshark, Snort, or Bro. Understanding of security frameworks and regulations such as NIST or PCI-DSS. Must have excellent communication skills and be able to communicate complex technical information to non-technical stakeholders in a clear and concise manner. Must understand the company's long-term vision and align with it. Nice-to-have skills Qualifications 3-5 years of work experience in relevant field B.Tech/B.E/M.Tech or MCA degree from a reputed university. Computer science background is preferred
Posted 1 week ago
4.0 - 6.0 years
7 - 11 Lacs
Pune
Work from Office
As a Senior Network Security Specialist at Incedo, you will be responsible for managing and maintaining client network security. Your duties will include implementing security protocols, monitoring security logs, conducting vulnerability assessments, collaborating with other teams to manage risk, and providing security recommendations. Roles & Responsibilities: Designing and implementing network security strategies. Identifying and mitigating network security threats and vulnerabilities. Configuring and managing security devices such as firewalls and intrusion detection systems. Conducting security audits and assessments. Collaborating with other IT teams to ensure security policies and procedures are implemented. Providing technical support for security-related issues. Maintaining documentation of security configurations and changes. Technical Skills Skills Requirements: Knowledge of network security practices such as access control, intrusion detection, and incident response. Experience in configuring and managing network security devices such as firewalls, VPNs, and IDS/IPS. Familiarity with network security monitoring tools such as Wireshark, Snort, or Bro. Understanding of security frameworks and regulations such as NIST or PCI-DSS. Must have excellent communication skills and be able to communicate complex technical information to non-technical stakeholders in a clear and concise manner. Must understand the company's long-term vision and align with it. Provide leadership, guidance, and support to team members, ensuring the successful completion of tasks, and promoting a positive work environment that fosters collaboration and productivity, taking responsibility of the whole team. Nice-to-have skills Qualifications Qualifications 4-6 years of work experience in relevant field B.Tech/B.E/M.Tech or MCA degree from a reputed university. Computer science background is preferred
Posted 2 weeks ago
90.0 years
0 Lacs
Pune, Maharashtra, India
On-site
At Allstate, great things happen when our people work together to protect families and their belongings from life’s uncertainties. And for more than 90 years our innovative drive has kept us a step ahead of our customers’ evolving needs. From advocating for seat belts, air bags and graduated driving laws, to being an industry leader in pricing sophistication, telematics, and, more recently, device and identity protection. Job Description We are seeking an experienced Threat Hunter to perform intelligence-driven network defense supporting the monitoring and incident response capabilities. The role will involve analysis of large amounts of data from vendors and internal sources, including various indicator feeds, Splunk, and several threat intelligence tools, etc. The candidate will perform the functions of threat operations and hunting and serve as a liaison for Threat Intelligence for the Cyber Security Operations Center, and mentor the incident handling, incident response, and forensics teams. Key Responsibilities Performs research and analysis of potential and known threats and vulnerabilities for assigned areas and cybersecurity operational systems; designs, executes, and records results of testing plans and scripts and suggests improvements Understanding of common network and application stack protocols, including but not limited to TCP/IP, SMTP, DNS, TLS, XML, HTTP, etc. Experience with security operations tools, including but not limited to: SIEM (e.g. Defender, Splunk, ArcSight) EDR (e.g. CrowdStrike, Tanium) Indicator management (e.g. ThreatConnect) Signature development/management (e.g. Snort rules, Yara rules) Knowledge of common security infrastructure tools (NIDS, HIPS, EDR, etc.) Excellent analytical and problem solving skills, a passion for research and puzzle-solving. Understanding of large, complex corporate network environments. Strong communication (oral, written, presentation), interpersonal and consultative skills, especially in regard to white papers, briefs, and presentations. Good organization and documentation skills Peer collaboration and mentorship skills Critically evaluates business processes and cybersecurity systems to develop incident response plans for assigned area; executes plan to detect, alert, and contain intrusions and attacks, ensure required actions are taking place, and communicate status to affected areas and leadership. Education 4 year Bachelors Degree (Preferred) Experience 2 or more years of experience (Preferred) Supervisory Responsibilities This job does not have any supervisory duties Education & Experience (in Lieu) In lieu of the above education requirements, an equivalent combination of education and experience may be considered. Primary Skills IT Security Operations, Security Tools, Technical Investigation, Threat Assessment, Vulnerability Scanning Shift Time Shift B (India) Recruiter Info Yateesh B G ybgaa@allstate.com About Allstate The Allstate Corporation is one of the largest publicly held insurance providers in the United States. Ranked No. 84 in the 2023 Fortune 500 list of the largest United States corporations by total revenue, The Allstate Corporation owns and operates 18 companies in the United States, Canada, Northern Ireland, and India. Allstate India Private Limited, also known as Allstate India, is a subsidiary of The Allstate Corporation. The India talent center was set up in 2012 and operates under the corporation's Good Hands promise. As it innovates operations and technology, Allstate India has evolved beyond its technology functions to be the critical strategic business services arm of the corporation. With offices in Bengaluru and Pune, the company offers expertise to the parent organization’s business areas including technology and innovation, accounting and imaging services, policy administration, transformation solution design and support services, transformation of property liability service design, global operations and integration, and training and transition. Learn more about Allstate India here.
Posted 2 weeks ago
170.0 years
0 Lacs
Greater Hyderabad Area
On-site
Area(s) of responsibility About Us Birlasoft, a global leader at the forefront of Cloud, AI, and Digital technologies, seamlessly blends domain expertise with enterprise solutions. The company’s consultative and design-thinking approach empowers societies worldwide, enhancing the efficiency and productivity of businesses. As part of the multibillion-dollar diversified CKA Birla Group, Birlasoft with its 12,000+ professionals, is committed to continuing the Group’s 170-year heritage of building sustainable communities. Location -Mumbai ,Pune ,Bangalore, Hyderabad , Noida Exp -8 yrs to 10 yrs About The Role We are seeking a skilled Network Security Engineer to design, implement, and maintain secure network infrastructures. The ideal candidate will possess strong expertise in network protocols, firewall and IDS/IPS configuration, VPN solutions, and security compliance standards. You will be instrumental in enhancing our network security posture through threat detection, risk assessment, and zero trust architecture implementation. Key Responsibilities Design, configure, and manage network security devices including firewalls (Palo Alto, Fortinet, Cisco ASA) and intrusion detection/prevention systems (Snort, Suricata). Implement and manage Network Access Control (NAC) systems utilizing 802.1X, RADIUS, and Cisco ISE for role-based access control. Configure and maintain secure VPN solutions including IPsec, SSL VPNs, and site-to-site tunnels. Conduct SIEM and log analysis using tools such as Splunk, QRadar, and ELK Stack to detect and respond to security threats. Design and enforce network segmentation and apply Zero Trust security principles. Ensure compliance with security standards such as ISO 27001, NIST, PCI-DSS, GDPR, and HIPAA. Perform threat modeling, vulnerability assessments, and risk analysis to mitigate security risks. Collaborate with cross-functional teams to develop and enforce security policies and procedures. Core Technical Competencies Deep understanding of network protocols including TCP/IP, UDP, ICMP, DNS, HTTP/S, FTP. Hands-on experience with firewall and IDS/IPS tools such as Palo Alto, Fortinet, Cisco ASA, Snort, and Suricata. Familiarity with Network Access Control frameworks (802.1X, RADIUS), especially Cisco ISE. Expertise in VPN technologies like IPsec and SSL VPNs. Proficiency in SIEM platforms and log correlation for threat detection and incident response. Knowledge of network segmentation strategies and Zero Trust architecture. Strong understanding of compliance requirements (ISO 27001, NIST, PCI-DSS, GDPR, HIPAA). Ability to conduct threat modeling and risk assessments. Required Certifications CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CEH (Certified Ethical Hacker) CompTIA Security+ CCNP Security (Cisco Certified Network Professional Security) Palo Alto PCNSA/PCNSE Qualifications Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field (or equivalent experience). Proven experience in network security engineering or a similar role. Why Join Us? Work with cutting-edge security technologies. Collaborate with a passionate and dynamic security team. Opportunities for professional growth and certification support.
Posted 2 weeks ago
170.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
About Us: Birlasoft, a global leader at the forefront of Cloud, AI, and Digital technologies, seamlessly blends domain expertise with enterprise solutions. The company’s consultative and design-thinking approach empowers societies worldwide, enhancing the efficiency and productivity of businesses. As part of the multibillion-dollar diversified CKA Birla Group, Birlasoft with its 12,000+ professionals, is committed to continuing the Group’s 170-year heritage of building sustainable communities. Location -Mumbai ,Pune ,Bangalore, Hyderabad , Noida Exp -8 yrs to 10 yrs About the Role: We are seeking a skilled Network Security Engineer to design, implement, and maintain secure network infrastructures. The ideal candidate will possess strong expertise in network protocols, firewall and IDS/IPS configuration, VPN solutions, and security compliance standards. You will be instrumental in enhancing our network security posture through threat detection, risk assessment, and zero trust architecture implementation. Key Responsibilities: Design, configure, and manage network security devices including firewalls (Palo Alto, Fortinet, Cisco ASA) and intrusion detection/prevention systems (Snort, Suricata). Implement and manage Network Access Control (NAC) systems utilizing 802.1X, RADIUS, and Cisco ISE for role-based access control. Configure and maintain secure VPN solutions including IPsec, SSL VPNs, and site-to-site tunnels. Conduct SIEM and log analysis using tools such as Splunk, QRadar, and ELK Stack to detect and respond to security threats. Design and enforce network segmentation and apply Zero Trust security principles. Ensure compliance with security standards such as ISO 27001, NIST, PCI-DSS, GDPR, and HIPAA. Perform threat modeling, vulnerability assessments, and risk analysis to mitigate security risks. Collaborate with cross-functional teams to develop and enforce security policies and procedures. Core Technical Competencies: Deep understanding of network protocols including TCP/IP, UDP, ICMP, DNS, HTTP/S, FTP. Hands-on experience with firewall and IDS/IPS tools such as Palo Alto, Fortinet, Cisco ASA, Snort, and Suricata. Familiarity with Network Access Control frameworks (802.1X, RADIUS), especially Cisco ISE. Expertise in VPN technologies like IPsec and SSL VPNs. Proficiency in SIEM platforms and log correlation for threat detection and incident response. Knowledge of network segmentation strategies and Zero Trust architecture. Strong understanding of compliance requirements (ISO 27001, NIST, PCI-DSS, GDPR, HIPAA). Ability to conduct threat modeling and risk assessments. Required Certifications: CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CEH (Certified Ethical Hacker) CompTIA Security+ CCNP Security (Cisco Certified Network Professional Security) Palo Alto PCNSA/PCNSE Qualifications: Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field (or equivalent experience). Proven experience in network security engineering or a similar role. Why Join Us? Work with cutting-edge security technologies. Collaborate with a passionate and dynamic security team. Opportunities for professional growth and certification support.
Posted 2 weeks ago
5.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
About the Role We are seeking a highly skilled and hands-on AI/ML Lead with deep experience in training and fine-tuning Large Language Models (LLMs) such as LLaMA 3 using frameworks like vLLM. The ideal candidate will bring a strong background in machine learning and a practical understanding of the cybersecurity domain—especially around threat intelligence, vulnerabilities, exploits, and configuration analysis. You will lead the development and implementation of models that understand, process, and generate insights across a wide range of cybersecurity content. You will guide a team of ML engineers and collaborate closely with cybersecurity SMEs, data engineers, and DevOps to ensure delivery of scalable, performant, and security-aware AI systems. Key Responsibilities Lead the fine-tuning and domain adaptation of open-source LLMs (e.g., LLaMA 3) using frameworks like vLLM, HuggingFace, DeepSpeed, and PEFT techniques. Develop data pipelines to ingest, clean, and structure cybersecurity data, including threat intelligence reports, CVEs, exploits, malware analysis, and configuration files. Collaborate with cybersecurity analysts to build taxonomy and structured knowledge representations to embed into LLMs. Drive the design and execution of evaluation frameworks specific to cybersecurity tasks (e.g., classification, summarization, anomaly detection). Own the lifecycle of model development including training, inference optimization, testing, and deployment. Provide technical leadership and mentorship to a team of ML engineers and researchers. Stay current with advances in LLM architectures, cybersecurity datasets, and AI-based threat detection. Advocate for ethical AI use and model robustness, especially given the sensitive nature of cybersecurity data. Required Qualifications 5+ years of experience in machine learning, with at least 2 years focused on LLM training or fine-tuning. Strong experience with vLLM, HuggingFace Transformers, LoRA/QLoRA, and distributed training techniques. Proven experience working with cybersecurity data—ideally including MITRE ATT&CK, CVE/NVD databases, YARA rules, Snort/Suricata rules, STIX/TAXII, or malware datasets. Proficiency in Python, ML libraries (PyTorch, Transformers), and MLOps practices. Familiarity with prompt engineering, RAG (Retrieval-Augmented Generation), and vector stores like FAISS or Weaviate. Demonstrated ability to lead projects and collaborate across interdisciplinary teams. Excellent problem-solving skills and strong written & verbal communication. Nice to Have Experience deploying models via vLLM in production environments with FastAPI or similar APIs. Knowledge of cloud-based ML training (AWS/GCP/Azure) and GPU infrastructure. Background in reverse engineering, malware analysis, red teaming, or threat hunting. Publications, open-source contributions, or technical blogs in the intersection of AI and cybersecurity. What We Offer Opportunity to work at the intersection of cutting-edge AI and cybersecurity. Collaborative and fast-paced environment. Access to state-of-the-art hardware and ML tooling. Support for research, conferences, and continuous learning.
Posted 2 weeks ago
0 years
0 Lacs
New Delhi, Delhi, India
On-site
Job Description We are seeking a talented DevOps and Infrastructure Engineer to join our dynamic team. The ideal candidate will have a passion for building and maintaining cloud infrastructure while ensuring the reliability and efficiency of our applications. You will be responsible for deploying and maintaining cloud environments, enhancing CI/CD pipelines, and ensuring optimal performance through proactive monitoring and troubleshooting. Roles and Responsibilities: Cloud Infrastructure: Deploy and maintain cloud infrastructure on Microsoft Azure or AWS, ensuring scalability and reliability. CI/CD Pipeline Enhancement: Continuously improve CI/CD pipelines and build robust development and production environments. Application Deployment: Manage application deployments, ensuring high reliability and minimal downtime. Monitoring: Monitor infrastructure health and perform application log analysis to identify and resolve issues proactively. Incident Management: Troubleshoot and debug incidents, collaborating closely with development teams to implement effective solutions. Infrastructure as Code: Enhance Ansible roles and Terraform modules, maintaining best practices for Infrastructure as Code (IaC). Tool Development: Write tools and utilities to streamline and improve infrastructure operations. SDLC Practices: Establish and uphold industry-standard Software Development Life Cycle (SDLC) practices with a strong focus on quality. On-call Support: Be available 24/7 for on-call incident management for production environments. Requirements:Incident Management: Troubleshoot and debug incidents, collaborating closely with development teams to implement effective solutions. Infrastructure as Code: Enhance Ansible roles and Terraform modules, maintaining best practices for Infrastructure as Code (IaC). Tool Development: Write tools and utilities to streamline and improve infrastructure operations. SDLC Practices: Establish and uphold industry-standard Software Development Life Cycle (SDLC) practices with a strong focus on quality. On-call Support: Be available 24/7 for on-call incident management for production environments. Requirements: Cloud Experience: Hands-on experience deploying and provisioning virtual machines on Microsoft Azure or Amazon AWS. Linux Administration: Proficient with Linux systems and basic system administration tasks. Networking Knowledge: Working knowledge of network fundamentals (Ethernet, TCP/IP, WAF, DNS, etc.). Scripting Skills: Proficient in BASH and at least one high-level scripting language (Python, Ruby, Perl). Tools Proficiency: Familiarity with tools such as Git, Nagios, Snort, and OpenVPN. Containerization: Strong experience with Docker and Kubernetes is mandatory. Communication Skills: Excellent interpersonal communication skills, with the ability to engage with peers, Education UG: BCA in Any Specialization, B.Tech/B.E. in Any Specialization PG: MCA in Any SpecializationAbout company Celeris Empowers Online Businesses with seamless global connectivity, Uniting Payment Providers and Acquirers for streamlined Communication, Control, and Management.
Posted 3 weeks ago
8.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Req ID: 285915 NTT DATA strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thinking organization, apply now. We are currently seeking a Network Security Firewall Specialist Advisor Palo Alto to join our team in Noida, Uttar Pradesh (IN-UP), India (IN). Drive for results - Ability to grasp complex issues to arrive at optimal solutions - Strong ethics and integrity - Flexible to changing needs of customer , account and team - Excellent customer facing communication skills, customer support and knowledge of ITIL best practices. ITIL certification is a plus. - High-level experience and proved knowledge in atleast 3 of different network security products likes Firewalls (Watchguard, Cisco, Palo Alto), Content Filtering (Cisco Umbrella, Bluecoats, Websense, McAfee Web gateway) and IDS/IPS (Cisco Sourcefire, McAfee, Tipping Point, Snort) - Strong working knowledge of Cisco Firepower ASA and FTD. - High-level networking troubleshooting skills and extensive knowledge of web connectivity and protocols (WCCP, PAC files, TCP/IP, HTTP, HTTPS, SSL, FTP, Telnet, SSH, etc.) - Understanding the integration with authentication protocols such as LDAP, IWA, IWA-direct, SSO, Active directory. - At least 2 High-level certification in Network security from any of the vendors like Cisco, Checkpoint, Juniper, McAfee, BlueCoat, SourceFire (CCNP, JNCIs, etc) - Candidate must possess good time management skills to properly manage operations duties and other task that will assist in the optimization of the Network Security team - Clear understanding of Windows and Linux operating systems - 8+ years of network troubleshooting experience and at least 4-5 years Network Security administration and design experience - Bachelor’s degree or equivalent experience. About NTT DATA NTT DATA is a $30 billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long term success. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure and connectivity. We are one of the leading providers of digital and AI infrastructure in the world. NTT DATA is a part of NTT Group, which invests over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. Visit us at us.nttdata.com NTT DATA is an equal opportunity employer and considers all applicants without regarding to race, color, religion, citizenship, national origin, ancestry, age, sex, sexual orientation, gender identity, genetic information, physical or mental disability, veteran or marital status, or any other characteristic protected by law. We are committed to creating a diverse and inclusive environment for all employees. If you need assistance or an accommodation due to a disability, please inform your recruiter so that we may connect you with the appropriate team.
Posted 3 weeks ago
10.0 - 13.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Summary Position Summary Cyber Threat Intelligence Collection Manager Overview Of The Job As part of the global Centralized Cybersecurity Threat Intel team, the Collection Manager reports to the Threat Intelligence Operation Lead. Leading the collection, ingestion, analysis and documentation of intelligence sources. Your primary role will be to lead a small team of collection analysts to make sure the intel that we collect helps us answer the issues our decision makers care about. As a Collection Manager, you will lead the collection and ingestion of intelligence data and internal telemetry, lead the processing of said data to become information that intelligence analysts can work with, evaluation of the sources, follow and lead the external threat monitoring and darkweb investigations’ capability, drive the team’s intelligence collection management plan, vendor and sources management evaluation and procurement internal process. The right candidate is a motivated individual with excellent managerial skills to organize and motivate an international team of collections analysts to identify new data sources, process existing data to be able to analyze in new and innovative ways, and create analytics, rules, and logic to detect badness in our environment. Additionally, the Collection Manager will regularly interface with Global security teams and vendors to ensure our intelligence collection needs are met. Other responsibilities include to : Identify and curate intelligence relevant to Deloitte’s Priority Intelligence Requirements (PIRs). Create and maintain analytics that can run on security devices and SIEM. Collaborate with internal stakeholders and work actively with vendors. Gain and maintain access for the TI team to Deloitte internal data and telemetry at the Global and MF level from sources to include but not limited to email, FWs, WAFs, IDPS, etc. Manage relationships with vendors and their procurement process. Create, maintain and update the high-level collection management plan. Processing and documenting intelligence from various data sources. Manage the conference attendance plan for the entire intelligence team. Support the intel sharing effort. Organize and maintain our database of technical indicators, intelligence reports, and briefings. Develop workflows for intelligence collection ranging from open source, vendor feeds, internal telemetry, etc. Lead a small, diverse team of regionally dispersed collections and malware analysts. Review, edit, and revise Malware and Threat Actor behavior report writings. Coordinate intelligence support to internal threat hunting efforts. Coordinate with Production Manager to ensure the right data is available to satisfy consumer requirements. Oversee collection metrics, seize all opportunities to improve quality and efficiency. Organize and provide training and staff professional development to the collection team to maintain expertise. Qualifications Education: Bachelor’s degree - a technology-related field, or equivalent education-related experience. Required Technical Experience: 10-13 years of experience in security operations or threat intelligence with a minimum of 2 years of experience in a management role or 8 years work experience with demonstrated leadership potential during that time. Experience working and managing large data sets and data feeds, especially from commercial threat intelligence vendors. Understanding of host and network forensic artifacts and indicators of compromise. Experience and knowledge of major cyber threat actors and their malware families activity and main behavior. Experience working in information technology / cyber security for a large, complex enterprise and collaborating across teams. Demonstrated ability to solve complex technical problems and adapt to changing technologies. Demonstrate excellent mastery of English, with strong written, verbal, and interpersonal communication skills. Desirable Skills And Experience Understanding and knowledge about the latest cyber threat trends. Familiarity with company internal procurement processes, vendor/sources contracts and renewals. Familiarity with Threat Intelligence Platform software such as ThreatConnect, OpenCTI or Anomali. Experience participating in threat intelligence sharing organizations. Intelligence Collections experience supporting report creation. Experience in scripting languages, especially Python, with a strong understanding of software development principles. Ability to create SNORT, YARA, SIGMA, and other behavior-based detection rules. Understanding of Splunk Enterprise Security, to include LookupTables and Splunk Threat Intelligence data model. Leadership & Management Qualifications and Skills: Monitor project progress, identify potential risks, and implement mitigation strategies. Report the projects status weekly gaining the track of each project from the team members. Responsible for planning, managing, and coordinating projects and teams for the development of new products, sources and improvements. Ability to provide oversight across multiple initiatives or projects. Experience working independently and geographically separate from some team members. Mentor and coach team members, fostering a culture of continuous learning and innovation. Desire and ability to work in a dynamic, fast-paced environment. Experience maintaining documentation. Work Location: Hyderabad Work Timing: 11AM – 8PM Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Professional development At Deloitte, professionals have the opportunity to work with some of the best and discover what works best for them. Here, we prioritize professional growth, offering diverse learning and networking opportunities to help accelerate careers and enhance leadership skills. Our state-of-the-art DU: The Leadership Center in India, located in Hyderabad, represents a tangible symbol of our commitment to the holistic growth and development of our people. Explore DU: The Leadership Center in India . Benefits To Help You Thrive At Deloitte, we know that great people make a great organization. Our comprehensive rewards program helps us deliver a distinctly Deloitte experience that helps that empowers our professionals to thrive mentally, physically, and financially—and live their purpose. To support our professionals and their loved ones, we offer a broad range of benefits. Eligibility requirements may be based on role, tenure, type of employment and/ or other criteria. Learn more about what working at Deloitte can mean for you. Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Requisition code: 303042
Posted 3 weeks ago
3.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
About PhonePe Group: PhonePe is India’s leading digital payments company with 50 crore (500 Million) registered users and 3.7 crore (37 Million) merchants covering over 99% of the postal codes across India. On the back of its leadership in digital payments, PhonePe has expanded into financial services (Insurance, Mutual Funds, Stock Broking, and Lending) as well as adjacent tech-enabled businesses such as Pincode for hyperlocal shopping and Indus App Store which is India's first localized App Store. The PhonePe Group is a portfolio of businesses aligned with the company's vision to offer every Indian an equal opportunity to accelerate their progress by unlocking the flow of money and access to services. Culture At PhonePe, we take extra care to make sure you give your best at work, Everyday! And creating the right environment for you is just one of the things we do. We empower people and trust them to do the right thing. Here, you own your work from start to finish, right from day one. Being enthusiastic about tech is a big part of being at PhonePe. If you like building technology that impacts millions, ideating with some of the best minds in the country and executing on your dreams with purpose and speed, join us! Information Security Engineer Objectives of this Role: Drive secure system configuration standards (E.g. CIS Benchmarks) implementation and vulnerability management efforts across the enterprise. Primarily in Linuxenvironments Evaluate and drive implementation of new Information security processes, tools and technologies Own the implemented solutions end-to-end, right from inception to deployment and monitoring to regular upkeep Liaise with cross functional teams to increase adoption of Information security standards Provide security event correlation use cases and logic to generate SIEM alerts Follow-up and close Information Security incidents/exceptions Measure and increase efficacy of Information Security initiatives Bring a DevSecOps mindset to implementations Skills And Qualifications 3+ years’ experience in Information security operations in a Linux heavy environment Experience with IDS/IPS systems like OSSEC, Wazhu, Suricata, Snort etc. Experience with Elastic and Kibana Experience with Vulnerability and Configuration Assessment and Management standards, tools/technologies like – CIS Benchmarks, CVE, OVAL, OpenVAS, Nessus, Qualys etc. Experience with opensource Identity Management with products like Apache Syncope, OpenIAM, Gluu etc. Hands-on experience with common Security tools in Linux Experience with SaltStack (or any other Infrastructure as code tools) Proficient in at least two of these languages: Python/Go/Java/Perl Good in basic data structures/algorithms Hands on experience on web scale production setup Awareness of cloud technologies, networking fundamentals, Mesos, KVM/QEMU, NodeJS/React will be good to have Ability to manage small teams PhonePe Full Time Employee Benefits (Not applicable for Intern or Contract Roles) Insurance Benefits - Medical Insurance, Critical Illness Insurance, Accidental Insurance, Life Insurance Wellness Program - Employee Assistance Program, Onsite Medical Center, Emergency Support System Parental Support - Maternity Benefit, Paternity Benefit Program, Adoption Assistance Program, Day-care Support Program Mobility Benefits - Relocation benefits, Transfer Support Policy, Travel Policy Retirement Benefits - Employee PF Contribution, Flexible PF Contribution, Gratuity, NPS, Leave Encashment Other Benefits - Higher Education Assistance, Car Lease, Salary Advance Policy Working at PhonePe is a rewarding experience! Great people, a work environment that thrives on creativity, the opportunity to take on roles beyond a defined job description are just some of the reasons you should work with us. Read more about PhonePe on our blog. Life at PhonePe PhonePe in the news
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough