Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
6.0 - 11.0 years
8 - 13 Lacs
Bengaluru
Work from Office
Candidates for this position are preferred to be based in Bangalore, India and will be expected to comply with their teams hybrid work schedule requirements. Wayfair is the online leader for home furnishings and decor. Through technology and innovation, Wayfair makes it possible for shoppers to quickly and easily find exactly what they want from a selection of more than 8 million items across home furnishings, d cor, home improvement, housewares and more. Wayfair operates a growing Security Operations Center and we re looking for a talented Security Engineer to join and help grow our team. Our Security Operations team is tasked with monitoring and protecting Wayfair from an ever growing number of security risks, and finding new and creative ways to do so. We have a strong focus on engineering and innovation, and are seeking individuals who love to find new problems and hate fixing the same problem twice. What You ll Need 6+ years experience working in cyber security operations Thorough understanding of the threat landscape, the latest security trends, attack vectors for corporate and cloud environments, and how build detection and response tooling to identify and respond to malicious actors Experience with building and scaling SOAR/SIEM technologies Experience with incident detection and remediation Strong working knowledge of threat vectors, vulnerabilities, and what anomalies to look for Strong working knowledge of Linux and/or Windows logs & indicators Python experience to build and automate tooling Experience writing SIEM logging parsing rules Hands-on experience with incident response and monitoring tools, such as SIEM, EDR, cloud monitoring, etc. Strong communication skills, especially the ability to communicate security risks in business rather than purely engineering Strong understanding of cyber security best practices and frameworks such as NIST, MITRE, ATT&CK Framework, and OWASP Top 10 What You ll Do In this role you will work closely with the cyber security organization to build monitoring and response tooling and processes to reduce our mean-time-to-detect and remediate to keep up with threat actors changing tactics, techniques, and procedures (TTPs) Logging - Get all security relevant cloud, infrastructure and application logs parsed, and into our SIEM Detection - Setup detection and prevention rules and policies, PoC and deploy tools that help with detection, tune/audit deployed rules/policies in security tools on true and false positives, setting up a detection framework Response - Build plan and procedures for Incident Response, create playbooks to be followed, automate response, develop/deploy malware analysis tools and techniques, forensic tools and techniques to capture evidence/malware, PoC and deploy tools that help with response, integrate with customer service teams and engineering teams etc. Build security alerts & dashboards in various incident response tools. Monitor for suspicious activities/alerts in the cloud / infrastructure / application from various sources such as internal reports from employees as well as external reports such as customers/social media, vendors, partners, bug bounty programs etc., deployed/integrated security tools, data visualization tools etc. Support tooling to help analyze suspicious activities/alerts including malware analysis and forensics Build and maintain security infrastructure tooling that supports continuous SOC operations and vulnerability management As needed, support the response to security alerts and incidents, and take appropriate action to remediate and resolve .
Posted 3 weeks ago
7.0 - 12.0 years
9 - 14 Lacs
Bengaluru
Work from Office
We help the world run better What youll do: The main objective of the Senior Project Manager - Compliance & Certification is to accompany the security compliance governance of cloud products within the scope of our Information Security and Business Continouty Management Systems having a holistic approach end-to-end. Youll collaborate with cross-functional teams, including IT, Legal, and Finance, to address technology and security compliance needs Taking over responsibilities in prioritising security compliance issues together with the respective operations or development teams will be part of your main activities. As in cloud computing technical security, security controls, and technical and organisational measures are converging, a broad and holistic view on all aspects of compliance and governance is necessary. Your role will contribut to manage compliance initiatives, including gap assessments and consult of implementation and governance of controls to address regulatory requirements. You will consult and coordinat cross-functional especially in the area of legal, contractual and reglutroy compliance and obligations. You are the main contact to translate these into controls and transfer those into governance activities, i.e for SOC, C5, TISAX, CSA Star. Advising on framework and governance activities while providing a holistic overview of the strategic positioning of compliance and information security to the business units will be your day-to-day responsibility What you bring: 7+ years project management and/or program management 4+ years of professional compliance, certifications, and software consulting experience Working experience in international and virtual projects Master s / Bachelor s degree in computer /natural science, economics, engineering or related proficiency in business economics and process analytics. Deep knowledge of ISO, SOC and C5 related certifications and audits Passion for compliance and background in consulting (SDOL, IT Security Concepts, Product Security, Data Governance). Strong analytical and communication skills. Profession in English - verbal and written. Agility, openness, and ability to adapt to a dynamic environment Strong project management skills and records in external compliance and obligations Strong know how about cloud platform technologies like Infrastructure Management, Management System, Information Security, Virtualization, Container, Networ Meet your Team: The Governance, Compliance & Certification Office is responsible for the governance of compliance of all customer-facing cloud development and operations of our stakeholders. We offer the possibility to be a key player within our highly motivated Office by translating compliance and legal language into tangible good practices, while supporting and consulting stakeholders along the cloud value chain. Bring out your best . Successful candidates might be required to undergo a background verification with an external vendor. Requisition ID: 426618 | Work Area: Software-Design and Development | Expected Travel: 0 - 10% | Career Status: Professional | Employment Type: Regular Full Time | Additional Locations: #LI-Hybrid. Requisition ID: 426618 Posted Date: May 21, 2025 Work Area: Software-Design and Development Career Status: Professional Employment Type: Regular Full Time Expected Travel: 0 - 10% Location:
Posted 3 weeks ago
8.0 - 12.0 years
25 - 30 Lacs
Kolkata, Siliguri, Asansol
Work from Office
Job Title: Senior DevOps Engineer Location: Remote Company: Smartlead.ai Experience: 8-12 Years Reports to: Head of Engineering About Smartlead.ai Smartlead is a cutting-edge platform designed to transform cold email outreach into a reliable revenue engine. We help businesses elevate their outreach, effectively engage prospects, and drive significant revenue growth. As a bootstrapped and profitable startup, Smartlead has ranked in the top 4% of the worlds fastest-growing SaaS companies, according to ChartMogul. About the role As our Senior DevOps Engineer, you will be the architect and ambassador of reliability, automation, and scale. You will be a hands on executor of DevOps while also planner and implementor of the longer term DevOps strategy. You will be expected to take our DevOps automation and infrastructure maturity to the next level. You ll partner closely with engineering, QA, product, and security teams to embed DevOps best practices, tooling, and culture across the organization. What You ll Do DevOps Strategy & Leadership Define and execute our vision for CI/CD, IaC, monitoring, and run-book automation. Evangelize DevOps principles via brown-bags, documentation, and team workshops. Build & Maintain Scalable Pipelines Architect self-service pipelines in Jenkins/GitLab CI/GitHub Actions or equivalent. Ensure zero-touch deployments, parallel testing, and rapid rollbacks. Infrastructure as Code & Cloud Automation Model multi-region cloud environments (AWS) with Terraform, CloudFormation, or Pulumi. Implement configuration management (Ansible, Puppet, Chef) to enforce consistency and security. Reliability, Observability & Performance Design robust logging/metrics/alerting (Prometheus, Grafana, ELK, Datadog). Champion SLOs/SLIs, stress-test production, and drive continuous performance tuning. Security & Compliance by Design Integrate security scans, vulnerability assessments, and compliance checks into pipelines. Partner with InfoSec to maintain SOC 2, GDPR, HIPAA, or other relevant certifications. What Success Looks Like Improvements in DevOps automation Increase in Infrastructure Maturity You ll Excel If You Have 8+ years in DevOps/SRE or similar roles, with at least 3 years in a senior/principal capacity Deep cloud expertise in AWS and strong hands-on automation skills Proven track record building and optimizing CI/CD pipelines (Jenkins, GitLab CI, GitHub Actions, etc.) Solid IaC experience: Terraform, CloudFormation, Pulumi, Ansible, Puppet, or Chef Containerization mastery: Docker & Kubernetes (EKS/AKS/GKE) Advanced scripting skills in Python, Bash, or PowerShell Expertise in Linux/Windows administration, networking fundamentals (TCP/IP, DNS, firewalls) Strong background in monitoring/observability tools: Prometheus, Grafana, ELK, Datadog, New Relic, etc. Excellent communicator and collaborator comfortable influencing stakeholders at all levels Security-first mindset: IAM, secrets management, vulnerability scanning, compliance frameworks Experience in dealing with infrastructure related outages Why Join Smartlead.ai? Remote-first culture: Work from anywhere, as long as you get things done Zero fluff: High ownership, fast decisions, minimal bureaucracy People-first mindset: We care about performance and well-being Growth opportunities: As we scale, so do you
Posted 3 weeks ago
8.0 - 13.0 years
25 - 30 Lacs
Bengaluru
Work from Office
Apply to this job Meta is hiring ASIC Verification Engineer with in-depth understanding of PCIe Express within the Infrastructure organization. We are looking for individuals with experience in verification of PCIe Switch, Root Complex and Endpoint to build IP and System On Chip (SoC) for data center applications.As a Design Verification Engineer, you will be part of a dynamic team working with the best in the industry, focused on developing innovative ASIC solutions for Facebook s data center applications. You will be responsible for the verification closure of a sub-system or SoC from test-planning, Hybrid test bench development to verification closure. The role also provides ample opportunities to partner and collaborate with full stack software, hardware, ASIC Design, Emulation and Post-Silicon teams towards creating a first-pass silicon success. ASIC DV Engineer, PCIe Verification Responsibilities Develop and execute verification plans, test cases, and scripts to ensure PCIe interface functionality, performance, and compliance with industry standards. Collaborate with design teams to understand the PCIe interface architecture and identify potential issues. Create and maintain testbenches, including simulation models and tests Perform simulation-based testing, including functional, performance, and compliance testing Analyze test results, identify defects, and work with design teams to resolve issues. Stay up-to-date with industry trends, standards, and best practices related to PCIe verification Debug, root-cause and resolve functional failures in the design, partnering with the Design team Mentor engineers to drive and deliver high confidence verification for highly complex ASIC projects. Minimum Qualifications Bachelors degree in Computer Science, Computer Engineering, relevant technical field, or equivalent practical experience At least 8+ years of relevant experience Track record of first-pass success in ASIC development Good knowledge of PCIe specifications, protocols, and standards covering Root Complex, End Point and Switch Good hands-on verification experience in PCIe Transaction, Link and Physical layer. Hands-on experience in Verilog, SystemVerilog, UVM , C/C++, Python based verification Experience in IP, Cluster and SoC level verification in both RTL and Gate Level Setup Proficiency in scripting languages such as Python, Perl, or TCL to build tools and flows for verification environments Experience in architecting and implementing DV setup for complex Subsystem and ASICs. Experience using analytical skills to craft novel solutions to tackle industry-level complex designs Demonstrated experience with effective collaboration with cross functional teams Preferred Qualifications Experience in development of PCIe Gen6/Gen7 DV testbench and infrastructure from scratch Hands-on experience with integration and usage of varied PCIe vendor VIP Experience in performance verification of PCIe Sub-System for AI/ML Applications etc Experience with development of fully automated flows and scripts for data exploration, analysis and performance verification Experience with revision control systems like Mercurial(Hg), Git or SVN Experience with simulators and waveform debugging tools Experience working across and building relationships with cross-functional design, model and emulation teams About Meta . Equal Employment Opportunity . Meta is committed to providing reasonable accommodations for qualified individuals with disabilities and disabled veterans in our job application procedures. If you need assistance or an accommodation due to a disability, fill out the Accommodations request form .
Posted 3 weeks ago
8.0 - 13.0 years
25 - 30 Lacs
Bengaluru
Work from Office
Apply to this job Meta is hiring ASIC Verification Engineer with background in Simulation Acceleration using Emulation and Hybrid Platforms within the Infrastructure organization. We are looking for individuals with experience in Simulation Acceleration and Emulation to build IP and System On Chip (SoC) for data center applications.As a Design Verification Engineer, you will be part of a dynamic team working with the best in the industry, focused on developing innovative ASIC solutions for Facebook s data center applications. You will be responsible for the verification closure of a sub-system or SoC from test-planning, Hybrid test bench development to verification closure. The role also provides ample opportunities to partner and collaborate with full stack software, hardware, ASIC Design, Emulation and Post-Silicon teams towards creating a first-pass silicon success. ASIC DV Engineer, Simulation Acceleration and Hybrid Verification Responsibilities Propose, implement and promote the Simulation Acceleration and Hybrid Verification Methodology to be used across the group, both at the Cluster and at the SoC level Work with Architecture and Design teams to come up with functional, use case and performance test plan for the DUT Define Verification scope, create environment, testplans and close use case scenarios and performance using targeted tests at Cluster and SoC level Debug, root-cause and resolve functional failures in the design, partnering with the Design team Develop and drive continuous Hybrid Verification improvements using the latest methodologies, tools and technologies from the industry Build reusable/scalable environments for Hybrid Verification. Evaluate and recommend solutions for Hybrid Verification and Simulation Acceleration Provide training for internal teams and mentoring engineers related to Hybrid Verification Methodology Minimum Qualifications Bachelors degree in Computer Science, Computer Engineering, relevant technical field, or equivalent practical experience At least 8+ years of relevant experience Track record of first-pass success in ASIC development Hands-on experience in Verilog, SystemVerilog, UVM, C/C++, Python based verification Experience of working with Zebu, Palladium, Veloce HW platforms Experience in Cluster and SoC level verification using Hybrid Simulation and Emulation based methodologies Proficiency in scripting languages such as Python, Perl, or TCL to build tools and flows for verification environments Experience in architecting and implementing Hybrid Verification infrastructure and executing verification cycle Experience using analytical skills to craft novel solutions to tackle industry-level complex designs Demonstrated experience with effective collaboration with cross functional teams Preferred Qualifications Experience in development of Simulation Acceleration and Hybrid verification environments from scratch Experience in performance verification of complex compute blocks like CPU, GPU or HW Accelerators, Ethernet, PCIe, DDR, HBM etc Experience in verification of Data-center applications like Video, AI/ML and Networking designs or integration verification of high-speed interfaces like Ethernet PCIe, DDR, HBM Experience with development of fully automated flows and scripts for data exploration, analysis and performance verification Experience with verification of ARM/RISC-V based sub-systems or SoCs Experience with revision control systems like Mercurial(Hg), Git or SVN Experience with simulators and waveform debugging tools Experience working across and building relationships with cross-functional design, model and emulation teams About Meta . Equal Employment Opportunity . Meta is committed to providing reasonable accommodations for qualified individuals with disabilities and disabled veterans in our job application procedures. If you need assistance or an accommodation due to a disability, fill out the Accommodations request form .
Posted 3 weeks ago
15.0 - 17.0 years
50 - 60 Lacs
Bengaluru
Work from Office
Job Description We are seeking a highly skilled and experienced DFT Engineer to join our dynamic team of engineers to develop the next-generation Flash Controllers. As an SoC DFT Engineer, you will be responsible for defining and implementing industry leading DFT solutions, with emphasis on SCAN, MBIST, BSDL etc. The ideal candidate will have a deep understanding of DFT Architecture, Implementation flow, MBIST, SCAN ATPG & Simulation expertise. ESSENTIAL DUTIES AND RESPONSIBILITIES: DFT Architecture definitions for SoC development Leading complex activities and providing solutions for complex DFT problems. Collaborate with cross-functional teams to define and refine SoC DFT requirements, ensuring alignment with industry standards and customer needs. Working closely with the Design, Verification, Physical Design & Test Engineering teams while guiding them on the test requirements and methodologies. Work closely with the Product Engineering team and understand the test requirements, get involved in complex silicon debugs. Evaluate all aspects of the SoC DFT flow from requirements, through detailed definitions, and work closely with the CAD to continuously improve the DFT methodology. Qualifications B.Tech / M,Tech / Phd in Electronics, Computer science or Electrical Engineering Minimum 15+ years of experience in DFT Strong understanding of DFT Architecture SKILLS : Extensive experience in SoC DFT architecture, DFT IP development and DFT methodology. Proven track record of driving DFT architecture in complex ASIC designs. Work independently on multiple complex DFT problems across different projects. Proficiency in ASIC DFT Implementation tools, simulation methodologies, and hardware description languages (HDLs). Proficiency in SCAN, MBIST implementation. Solid understanding of JTAG & BSDL standards. Good understanding on Test clocking requirements, Test mode timing closure. Proficiency in complex silicon debugs and yield analysis. Solid understanding of SoC architecture and low-power design principles. Understanding of High-Speed interfaces (PCIe or UFS protocols) and experience with SSD/Flash is advantage. Excellent analytical and problem-solving skills. Strong communication skills and the ability to work effectively in cross-functional teams.
Posted 3 weeks ago
6.0 - 10.0 years
13 - 18 Lacs
Mumbai, Hyderabad
Work from Office
Summary: Lead SOC technologies and Management, shall be responsible for ensuring the day-to-day operations and maintenance of the organization's security. Strengthen security posture and ensure the control effectiveness of security systems within an organization. Collaborate with diverse teams to ensure the seamless functioning of the Solutions, optimization of the security infrastructure and controls. Responsibilities: Ensure the day-to-day operations and maintenance of the organization's cyber security infrastructure and controls to protect systems, networks, and data. Ensure coverage and effectiveness of security operations and deployed solutions. Ensure optimum security, availability, performance, and capacity of security solutions under management. Configuration, Monitoring & Troubleshooting of SIEM, SOAR, UEBA, NBAD, Threat Intel, Deception etc. Responsible for Firmware upgrades, closing of Audit points/Vulnerabilities, Creation of Security Policies, Fine tuning of exiting Policies, Configuration Backups, Event Log Monitoring, Threat Intel integration, Signature finetuning etc. Ensure & maintain up-to-date documentation - SOPs, Architecture digrams etc. to remove dependency on people. Manage configuration changes and deployments according to established change management processes, ensuring minimal disruption and adherence to best practices. Ensure hardening, latest stable version and security patches of security devices and solutions Track EOL/EOS and ensure that there no technology obsolescence. Ensure resolution of incidents and outages, coordinating with internal teams and external vendors to restore service within agreed-upon SLAs. Handle escalations and run the smooth operations of security solutions. Identify & analyse pain areas in existing security operations & implement improvements Handle operational issues which require design/technical inputs. Ensure compliance with regulatory requirements, security policies, and security frameworks such as ISO 27001, NIST, or CIS Publish the relevant dashboards and status updates. Escalate deviations and violations in a timely manner. Remain current with organizations security policies, latest security advisories/threats, industry best practices and developments in cyber security, and recommend and implement best practices and technologies to mitigate emerging threats. Education: B.E/ B.Tech, MCA (Computer/IT)/B.Sc (Computer/IT) or degree in relevant field. Experience: Candidate should have 6+ years of experience preferably in Banking and Technology organization Knowledge: Sound experience in managing SOC technologies and operations in a large and complex environment. Should have sound understanding & knowledge of various SOC technologies & techniques like SIEM, SOAR, UEBA, NBAD, Threat Intel, Deception etc. Should have hands on experience on SOC platform administration, LOG Source integration, Playbook, Usecase engineering, incident response techniques and technologies. Finetune, configuring and thresholds for SIEM and vulnerability tools. Should have knowledge & understanding of IT infrastructure & networking technologies, operations and security principles. Ability to analyze endpoint, network, and application logs. Knowledge of various security methodologies and technical security solutions. Should prepare and implement the use cases for SOC monitoring team able to provide proactive threat hunting to detect incidents. Should have sound understanding about Threat Hunting, Mitigation and Response. Strong understanding of Regulatory security guidelines & master directions and security frameworks such as ISO 27001, NIST, or CIS. Should be well versed with ITIL and ITSM practices. Skills: Exceptional analytical, conceptual thinking, Troubleshooting and problem-solving skills. Strong leadership, negotiation, and conflict resolution skills. Detail-oriented with a focus on quality and accuracy in project/service deliverables Should have strong written, verbal and presentation skills. Ability to perform under pressure, influence stakeholders and work closely with them to determine acceptable solutions.
Posted 3 weeks ago
16.0 - 25.0 years
0 - 0 Lacs
Kochi
Work from Office
We are looking for a seasoned GRC Presales and Solution Architect with deep expertise in auditing, compliance assessments, and designing governance, risk, and compliance (GRC) programs. The ideal candidate will have hands-on experience with international standards and regulatory frameworks such as ISO 27001, SOC 2, PCI DSS, HIPAA, GDPR , and more. In this leadership role, you will be responsible for developing tailored GRC solutions, supporting sales initiatives, and guiding clients through the compliance journey. This position requires a blend of technical acumen, consulting experience, and exceptional communication skills to drive impactful client engagements globally. Key Responsibilities Presales Leadership Collaborate with sales teams to identify client needs and align them with tailored GRC solutions. Lead the creation and delivery of proposals, solution demonstrations, and client presentations. Serve as the subject matter expert (SME) during sales cycles, engaging with senior stakeholders to position the organization as a trusted GRC advisor. Solution Development Design end-to-end GRC solutions in line with global frameworks (ISO 27001, SOC 2, PCI DSS, HIPAA, GDPR, etc.). Create implementation roadmaps, control documentation, and process frameworks suited for diverse industry verticals. Continuously evolve solution offerings by incorporating the latest regulatory trends and compliance requirements. Audit & Assessment Expertise Lead audits, gap assessments, and readiness programs for compliance certifications. Support clients in operationalizing compliance controls and risk mitigation strategies. Build and advise on governance frameworks and enterprise-wide risk management processes. Team & Stakeholder Management Partner with internal technical and delivery teams for smooth handover from presales to execution. Mentor junior consultants, helping to scale the GRC practice through knowledge sharing and training. Maintain strong client relationships and act as a liaison with regulatory bodies when required. Qualifications & Experience Bachelor's degree in Computer Science, Information Security, or a related field (Master's degree or MBA preferred). Preferred certifications: CISSP, CISA, CISM, CRISC, ISO 27001 Lead Auditor/Implementer . Experience 15+ years of experience in GRC domains. Proven track record managing large-scale compliance programs across geographies and industries. Strong hands-on experience with GRC tools and processes, including audit readiness, risk management, and control implementation. Key Skills & Competencies Technical Expertise: In-depth knowledge of GRC frameworks, control design, and industry regulations. Familiarity with tools like RSA Archer, ServiceNow GRC, etc. Consultative Selling: Ability to articulate technical solutions into business value. Skilled in creating RFP responses, solution architectures, and sales documentation. Project Management: Experience managing complex, multi-stakeholder GRC initiatives with a strong focus on quality and timely delivery. Leadership & Communication: Excellent presentation, negotiation, and interpersonal skills. Ability to lead teams and collaborate across functional units. Required Skills GRC, Presales
Posted 3 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Noida
Work from Office
Position Overview The Tessent division seeks a highly motivated, creative, and energetic individual as Product Engineer, specializing in design-for-test (DFT) and test delivery at chip and system level. Tessent is the market and technology leader of automated tools for insertion of semiconductor design-for-test (DFT) structures, automatic test pattern generation (ATPG), embedded deterministic compression (EDT), memory built-in self-test (MBIST), logic built-in self-test (LBIST), diagnosis-driven yield analysis (DDYA), hierarchical DFT solutions such as Streaming Scan Network (SSN), and analog fault injection and test. This position presents a great opportunity to stay involved technically while getting exposure to marketing and interacting with sales. Responsibilities include but are not limited to: Define and characterize new product capabilities needed to meet customer requirements Work collaboratively with Tessent R&D to prototype, evaluate, and test new products and features within complex IC design flows Lead beta programs and support beta partners Drive product adoption and growth Create and deliver in-depth technical presentations, develop training material, white papers, contributed articles, and application notes Develop and review tool documentation such as user and reference manuals Work with customers as well as Siemens EDA stakeholders such as regional application engineers, global support engineers, and marketing Work through complex technical issues and independently create solutions and new methodologies Present complex principles in simple terms to broad audiences Collaborate and share information across team boundaries in written and spoken forms Some travel, domestic and international Job Qualifications The successful candidate will possess the following combination of education and work experience: BS degree (or equivalent) in Electrical Engineering, Computer Science, Computer Engineering, or related field is required Must have 5-8 years of experience, including 2+ years of experience in DFT for complex ASICs / SOCs, including some of the following areas: Automatic test pattern generation (ATPG), internal scan, embedded scan compression (EDT), packetized test delivery (SSN), memory built-in self-test (MBIST), logic built-in self-test (LBIST), IEEE 1687 IJTAG, analog design and simulation, hierarchical DFT implementation Must have industry experience with DFT tools, preferably Tessent tool suite Industry experience with inserting scan, running ATPG and debugging fault coverage Exposure to one or more adjacent IC disciplines such as the following a plus: o RTL coding and verification using Verilog/ SystemVerilog/VHDL o Synthesis and timing analysis o Place and route o Advanced IC packaging o DFT and test for embedded IP cores o Failure diagnosis o ATE use / test program development Candidate should be high energy, curious individual, self-motivated to learn new DFT methodologies and technologies Able to work as individual contributor and lead technical activities of junior engineers Strong problem-solving, reasoning and deduction skills and the ability to analyze and debug complex design and simulation issues Proficiency in LINUX and Windows environments Proficiency in a scripting language like TCL (preferred) or Python Excellent written and spoken English language communication skills Excellent organizational skills Location can be remote or hybrid in North America, or in-office at one the following Tessent locations: o Ottawa (Canada), Saskatoon (Canada), Wilsonville (Oregon), Fremont (California).
Posted 3 weeks ago
8.0 - 12.0 years
13 - 18 Lacs
Mumbai
Work from Office
Department: Information Security Location: Mumbai Reports to: IS GRC Head Employment Type: Full-time Job Purpose: This role is responsible for driving the organization’s Information Security Governance, Risk, and Compliance (GRC) function, Industry standards (ISO 27001, NIST CSF), and regulatory requirements. The candidate will lead internal audits, vendor risk governance, SOC 2 readiness, automation initiatives, client assessments, and security awareness across the enterprise—while managing a team of security professionals. Key Responsibilities: Governance, Risk & Compliance • Implement and maintain a scalable Information Security GRC framework based on ISO 27001, NIST Cybersecurity Framework, and applicable regulatory requirements (RBI, SEBI, IRDAI, DPDPA). • Manage the information security policy lifecycle, risk registers, and control objectives across business units. • Lead the exception management process, including impact assessments, approval workflows, and periodic reviews. Internal Audit & Control Testing • Plan and execute periodic internal audits, control design evaluations, and operational effectiveness testing for IT and cybersecurity controls. • Coordinate external assessments, including SOC 2 readiness, ISO 27001 surveillance audits, and customer/compliance audits. • Track and close audit findings with clear ownership, root cause analysis, and sustainable remediation plans. Vendor Risk Management (End-to-End) • Oversee the Third-Party Risk Management (TPRM) lifecycle: onboarding, risk assessment, security clauses, ongoing monitoring, and exit governance. • Drive continuous oversight of critical vendors based on data exposure and service criticality, using automated tools where feasible. Automation & Tooling • Identify manual GRC activities suitable for automation; perform POCs, evaluate tools, and drive implementation. • Lead automation initiatives for risk assessments, control testing, evidence gathering, and exception workflows. SOC 2 & Compliance Readiness • Lead organizational readiness for SOC 2 Type 1 and Type 2 audits, working with Business SPOC's, application owners and control owners. • Align existing practices to SOC trust service criteria (Security, Availability, Confidentiality). Security Training & Awareness • Develop and deliver cybersecurity training and awareness programs tailored to various stakeholder groups (employees, management, vendors). • Promote a risk-aware culture and drive ongoing compliance awareness campaigns. Incident Response Oversight • Support and enhance the incident response governance process by aligning it with NIST CSF framework. • Ensure roles, responsibilities, and reporting mechanisms are clearly defined and followed during incidents. • Oversee the documentation of lessons learned, RCA, and incorporation of incidents into risk registers. Reporting & Stakeholder Engagement • Prepare and present dashboards, heatmaps, and reports for executive management, audit committees, and the board. • Maintain governance KRIs and provide insights into risk trends, audit closures, and compliance status. • Serve as a key liaison during client assessments, RFP security responses, and due diligence efforts. Team Leadership • Manage, mentor, and upskill a team of GRC analysts and specialists. • Allocate responsibilities, track performance, and foster collaboration across IT, Legal, Procurement, and Business teams. Key Requirements: Qualifications: • Bachelor’s/Master’s in Information Security, Computer Science, or related field. • Professional certifications preferred: CISA, CRISC, ISO 27001 LA, CISSP, CCSK, or equivalent. Experience: • 8+ years of experience in Information Security GRC, IT Risk, and Regulatory Compliance. • Strong expertise in internal audits, control testing, and vendor security governance. • Hands-on experience in managing SOC 2, ISO 27001, or similar frameworks. • Demonstrated leadership in team management and multi-stakeholder coordination. • Exposure to automating GRC functions using platforms like ServiceNow GRC, Archer, OneTrust, or similar. Skills & Competencies: • Strong analytical, documentation, and reporting skills. • Effective communication across technical and business audiences. • High level of integrity, ownership, and stakeholder management.
Posted 3 weeks ago
2 - 4 years
4 - 5 Lacs
Pune
Work from Office
Overview 170+ Years Strong. Industry Leader. Global Impact. At Pinkerton, the mission is to protect our clients. To do this, we provide enterprise risk management services and programs specifically designed for each client. Pinkerton employees are one of our most important assets and critical to the delivery of world-class solutions. Bonded together, we share a commitment to integrity, vigilance, and excellence. Pinkerton is an inclusive employer who seeks candidates with diverse backgrounds, experiences, and perspectives to join our family of industry subject matter experts. The Security System Analyst-Level I, will be responsible to look after the day to day operations in the Security Operation Centre of the client along with his team of Security System Analyst-II, under the supervision of Security Lead. Security Analyst will be responsible to monitor Surveillance Systems, Access Control, and Life Safety Devices. Responsibilities Represent Pinkerton's core values of integrity, vigilance, and excellence. Monitor Surveillance Systems, Access Control, and Life Safety Devices in the Security Operation Centre. Comply with laid down measures to achieve, under the supervision of the Physical Security Manager and locational Corporate Security Manager, protection, goals, objectives, and metrics consistent with the corporate strategic plan of the client within specified geographic boundaries. Implement security policies, standards, guidelines, and procedures to ensure ongoing security maintenance within specified geographic boundaries. Assist security leads to Investigate security breaches & compilation of incident reports for the same. Monitor the SOC post-integration of all electronic security and life safety systems and generate an analysis for the Corporate Security Function. Ensure all the above-mentioned activities are performed 24x7 for the entire period of the contract. All other duties, as assigned. Qualifications Graduate or Postgraduate with one to two years or more experience in corporate security, electronic security monitoring, forensics, or risk management industry. Experience in control room operation and team management is highly desirable. Previous experience in security control room operations or electronic security surveillance is preferred. Attention to detail and accuracy. Able to analyze issues and propose appropriate solutions. Strong written and verbal communication skills. Professional demeanor while interacting with internal and external stakeholders. Able to carry out responsibilities under general supervision. Serve as an effective team member. Able to organize workload for effective implementation. Computer skills; Microsoft Office. Working Conditions: With or without reasonable accommodation, requires the physical and mental capacity to effectively perform all essential functions; Regular computer usage. Occasional reaching and lifting of small objects and operating office equipment. Frequent sitting, standing, and/or walking. Roaster System; 24X7*6 days a week. Travel, as required. Pinkerton is an equal opportunity employer to all applicants and positions without regard to race/ethnicity, color, national origin, ancestry, sex/gender, gender identity/expression, sexual orientation, marital/prenatal status, pregnancy/childbirth or related conditions, religion, creed, age, disability, genetic information, veteran status, or any protected status by local, state, federal or country-specific law.
Posted 4 weeks ago
20 - 27 years
90 - 150 Lacs
Hyderabad
Work from Office
KEY EXPERTISE Seasoned ASIC Front End leader with 20 years of cross domain experience ranging from architecture, uArch, IP/Sub- systems/SOC/ chiplets design/integration, RTL coding, Synthesis, CDC, timing, power analysis, system/IP verification, Silicon Bring up. Proven track record of leading the design and development of complex IPs, sub-systems, chiplets for SOCs in the multiple domains like PCIE, USB, UCIE, ARM/x86 CPUs, RISC-V, VPU/NPU, GPU, LSIO, NOC, Fabrics, AMBA buses, DRAM, SD/SDIO/eMMC etc. Responsible for defining the technical direction of ASIC designs and collaborating with cross- functional teams to ensure successful ASIC implementation. Demonstrated strong leadership, project timelines & resources management and team management skills, and the ability to influence the technical strategy of the organization. Familiar with ASIC verification methodologies, DFT, Physical design and board design which help in influencing cross functional teams in getting desired results. Excellent execution capabilities to handle multiple domains in multiple projects simultaneously. Delivered superior results through team collaboration and diversity of thought. Always open to learn new technologies to grow in technical breadth and depth. Managed development of multiple sub-systems and IPs designed from scratch for Intel IOT (Elkhart Lake), Edge (Reefbay), dVPU/NPU (Arrow LakeR), GPU (DMR-D), Media (MTL-D), Smart NIC (Altera NIC), Palm Ridge, Mount Morgan IPU SoCs which are executed in advanced technology nodes of both Intel (18A, 3nm, 5nm) and TSMC (N3e, N5, N6). Have hands on experience in chiplets, Sub-systems and IP development (micro-architecture development, 3rd party IP integration (Synopsys, Verisilicon. SiFive RISCV, ARM cores etc.,), RTL implementation, synthesis, static timing analysis, Power analysis, system/IP level verification, FPGA emulation, Si bring-up) and SoC integration flows and methodologies. Led 30+ engineer design team and have good experience in working with cross-functional teams and cross BU teams across multiple geos, resulting in good collaboration and accelerated time to market. Led IP development (RTL design, Lint, CDC, Synthesis, timing, unit level and system level verification) of various IPs in Nvdia Tegra SoC processors (from first generation [APX] to ninth generation [Xavier]) and Cisco NIC chips. Have good working experience on low power design methodologies (clock gating, power gating, multi-vt and DVFS) used in mobile SoCs. Designed couple of modules in Tegra SoC like DMA engine, SD/SDIO/ eMMC5.2 host controller and bus-bridges for Nvidia proprietary buses. Worked on architecture, micro architecture, RTL design and timing analysis. Familiar with automotive electronics ISO26262 safety requirements. Was Executive member from Nvidia in SD card org and JEDEC (eMMC) forum. Participated in SD/SDIO4.x, SD host4.x and eMMC5.x specification development. Working experience with cross functional teams like back end, analog I/O pad and SW teams to ensure IP requirements are met at each stage. Have working experience in developing tree build and regression infrastructure. Have hands on experience in ASIC verification also - Test Planning, Develop Directed, Random and System-level (soc level) Test Cases; Design Test Bench using System Verilog; Develop Random Test environment; Execute Code Coverage & Analyse Reports, Execute Gate-level Simulations; Execute Functional & Regression Tests. Good Team Player: Participated and lead the effort of SD4.x/eMMC5.x host controller design and verification. Detail oriented go- getter with Fast Learning Curve and strong analytical, decision making, problem solving, visualizing, negotiating, communication & interpersonal skills. Mentored engineers, designed IP/SS schedules with proper staging plan with cross team dependencies, identified and solved technical issues, and ensured development of high-quality products.
Posted 4 weeks ago
1 - 2 years
3 - 4 Lacs
Bengaluru
Work from Office
Overview 170+ Years Strong. Industry Leader. Global Impact. At Pinkerton, the mission is to protect our clients. To do this, we provide enterprise risk management services and programs specifically designed for each client. Pinkerton employees are one of our most important assets and critical to the delivery of world-class solutions. Bonded together, we share a commitment to integrity, vigilance, and excellence. Pinkerton is an inclusive employer who seeks candidates with diverse backgrounds, experiences, and perspectives to join our family of industry subject matter experts. The Security System Analyst- Level I, assigned to a specific client, will be responsible for the day to day operations of the Security Operation Centre as well as the Security System Analyst- Level II team. Under the supervision of the Security Lead, the Analyst monitors surveillance systems, access control, and life safety devices. Responsibilities Represent Pinkerton's core values of integrity, vigilance, and excellence. Monitor surveillance systems, access control, and life safety devices in Security Operation Centre. Comply with measures to achieve, under supervision of the Physical Security Manager and locational Corporate Security Manager, protection, goals, objectives, and metrics consistent with the corporate strategic plan of the client within specified geographic boundaries. Implement the security policies, standards, guidelines, and procedures to ensure ongoing maintenance of security within specified geographic boundaries. Assist Security Leads to investigate security breaches and compilation of incident reports for the same. Monitor the SOC post-integration of all electronic security and life safety systems and generate an analysis for the Corporate Security Function. Ensure all the above-mentioned activities are performed 24x7 for the entire period of the contract. All other duties, as assigned. Qualifications Graduate or Postgraduate with one to two years of corporate security, electronic security monitoring, forensics, or risk management experience. Knowledge of security control room operations, team management, and electronic security surveillance, preferred. Attentive to detail and accuracy. Able to analyze issues and propose appropriate solutions. Effective written and verbal communication skills. Professional demeanor while interacting with internal and external stakeholders. Able to carry out responsibilities under general supervision. Serve as an effective team member. Able to organize workload for effective implementation. Computer skills; Microsoft Office. Working Conditions: With or without reasonable accommodation, requires the physical and mental capacity to perform effectively all essential functions. In addition to other demands, the demands of the job include: Regular computer usage. Manual dexterity required for occasional reaching and lifting of small objects and operating office equipment. Frequent sitting. Ability to work and manage roaster System; 24X7*6 days a week. Travel, as required. Pinkerton is an equal opportunity employer to all applicants and positions without regard to race/ethnicity, color, national origin, ancestry, sex/gender, gender identity/expression, sexual orientation, marital/prenatal status, pregnancy/childbirth or related conditions, religion, creed, age, disability, genetic information, veteran status, or any protected status by local, state, federal or country-specific law.
Posted 1 month ago
5 - 9 years
7 - 11 Lacs
Bengaluru
Work from Office
? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails
Posted 1 month ago
2 - 6 years
4 - 8 Lacs
Mumbai
Work from Office
Wipro Limited (NYSE:WIT, BSE:507685, NSE:WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role : Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
2 - 6 years
4 - 8 Lacs
Bengaluru
Work from Office
Wipro Limited (NYSE:WIT, BSE:507685, NSE:WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role : Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
1 - 3 years
5 - 9 Lacs
Bengaluru
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT ? ? Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
1 - 3 years
5 - 9 Lacs
Coimbatore
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT ? ? Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
1 - 3 years
5 - 9 Lacs
Pune
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT ? ? Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
1 - 3 years
5 - 9 Lacs
Hyderabad
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ? ? Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
2 - 6 years
4 - 8 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Technical Lead/ Project Lead Regular reporting & updates Security Intelligence (Practice) Coordination for security reasons External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively: Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization - Expert Process Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk - Expert Functional/Technical - Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills - Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Collaborative Working Execution Excellence Problem Solving & Analytical Skills Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT
Posted 1 month ago
5 - 10 years
7 - 12 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT
Posted 1 month ago
1 - 3 years
5 - 9 Lacs
Chennai
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT ? ? Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
1 - 3 years
5 - 9 Lacs
Noida
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT ? ? Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
3 - 8 years
5 - 10 Lacs
Hyderabad
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : SailPoint IdentityIQ Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. You will provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Your typical day will involve utilizing your expertise in SailPoint IdentityIQ and other security tools to ensure the security of our organization's systems and data. You will collaborate with cross-functional teams to identify and mitigate security risks, implement security measures, and respond to security incidents. Roles & Responsibilities: Expected to perform independently and become an SME. Required active participation/contribution in team discussions. Contribute in providing solutions to work related problems. Collaborate with cross-functional teams to identify and mitigate security risks. Implement security measures to protect enterprise systems, applications, and data. Utilize SailPoint IdentityIQ and other security tools to ensure the security of systems and data. Respond to security incidents and conduct investigations to determine the root cause. Stay updated with the latest security threats and vulnerabilities to proactively address them. Assist in the development and implementation of security policies and procedures. Provide guidance and support to other team members on security best practices. Professional & Technical Skills: Must To Have Skills:Proficiency in SailPoint IdentityIQ. Strong understanding of security principles, concepts, and best practices. Experience in designing and implementing security solutions. Knowledge of network security protocols and technologies. Familiarity with security frameworks and compliance standards. Good To Have Skills:Experience with security incident response and forensic analysis. Recommendation:Familiarity with other identity and access management (IAM) tools. Additional Information: The candidate should have a minimum of 3 years of experience in SailPoint IdentityIQ. This position is based at our Hyderabad office. A 15 years full time education is required. Qualifications 15 years full time education
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The job market for Security Operations Center (SOC) professionals in India is thriving with the increasing demand for cybersecurity experts. SOC jobs involve monitoring, detecting, and responding to security incidents to protect organizations from cyber threats. If you are considering a career in cybersecurity, exploring SOC roles in India can be a rewarding option.
These cities are known for their strong presence of IT and cybersecurity companies actively seeking SOC professionals.
The average salary range for SOC professionals in India varies based on experience and expertise. Entry-level SOC analysts can expect to earn around INR 4-6 lakhs per annum, while experienced SOC managers or consultants can command salaries ranging from INR 12-20 lakhs per annum.
In the SOC field, a typical career progression may include roles such as SOC Analyst, SOC Engineer, SOC Team Lead, SOC Manager, and eventually Chief Information Security Officer (CISO). Advancing through these roles often involves gaining experience, acquiring relevant certifications, and developing strong analytical and problem-solving skills.
Besides expertise in SOC operations, professionals in this field are expected to have knowledge of network security, incident response, threat intelligence, and cybersecurity tools. Proficiency in programming languages like Python, knowledge of SIEM (Security Information and Event Management) tools, and familiarity with compliance standards such as GDPR and ISO 27001 can also be beneficial.
As you navigate the SOC job market in India, remember to continuously enhance your skills, stay updated with industry trends, and showcase your passion for cybersecurity. With dedication and preparation, you can confidently pursue rewarding opportunities in this dynamic field. Good luck in your job search!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2