Jobs
Interviews

9 Systems Security Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 10.0 years

0 Lacs

pune, maharashtra, india

On-site

Minimum qualifications: Bachelor's degree or equivalent practical experience. 8 years of experience with one or more general purpose programming languages, including Java, C/C++ or Python. 5 years of experience testing, and launching software products. 3 years of experience with software design and architecture. Experience in Machine Learning or Artificial Intelligence. Experience in applications security, cryptography, network security, systems security or malware analysis. Preferred qualifications: Master's degree or PhD in Engineering, Computer Science, or a related technical field. 8 years of experience with data structures/algorithms. 3 years of experience in a technical leadership role leading project teams and setting technical direction. 3 years of experience working in a complex, matrixed organization involving cross-functional, or cross-business projects. 1 year of experience with UNIX/Linux or Windows environments, distributed systems, machine learning, information retrieval and TCP/IP. About the job Google's software engineers develop the next-generation technologies that change how billions of users connect, explore, and interact with information and one another. Our products need to handle information at massive scale, and extend well beyond web search. We're looking for engineers who bring fresh ideas from all areas, including information retrieval, distributed computing, large-scale system design, networking and data storage, security, artificial intelligence, natural language processing, UI design and mobile the list goes on and is growing every day. As a software engineer, you will work on a specific project critical to Google's needs with opportunities to switch teams and projects as you and our fast-paced business grow and evolve. We need our engineers to be versatile, display leadership qualities and be enthusiastic to take on new problems across the full-stack as we continue to push technology forward. With your technical expertise you will manage project priorities, deadlines, and deliverables. You will design, develop, test, deploy, maintain, and enhance software solutions. In this role, you will have an opportunity to work with our product teams to directly engage customers and partners to help define enterprise cybersecurity solutions. You will work on distributed planet scale security services. Google Cloud accelerates every organization's ability to digitally transform its business and industry. We deliver enterprise-grade solutions that leverage Google's cutting-edge technology, and tools that help developers build more sustainably. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems. Responsibilities Design and develop key components of security services in the realm of AI security for Google Cloud. Collaborate with peers and area Team Leads to undertake a productization of Secure AI initiatives. Ensure high standards of production availability and reliability of these services while sharing the on-call responsibilities with rest of the engineering team. Contribute towards building technical capabilities in the India team by mentoring/coaching other team members.

Posted 2 weeks ago

Apply

10.0 - 15.0 years

0 Lacs

haryana

On-site

As the Director, TSG Information Security, Cyber Threat Management at Bain's Cyber Security Department, your primary mission is to safeguard the organization's digital assets and integrity by defining and implementing effective security strategies. You will play a crucial role in aligning security measures with the organizational strategy, leading the development and implementation of security controls that meet regulatory requirements and best practices. Your responsibilities include organizing and managing a team, focusing on both defensive and offensive security strategies to support the company's overall business objectives. You will oversee the monitoring and detection of cybersecurity events, leading efforts to identify and analyze sophisticated security threats such as malware, APTs, and targeted attacks. Collaborating with cross-functional teams, you will enable the use of advanced security tools and technologies to enhance the organization's security posture. Additionally, you will be responsible for incident response management, including the evolution of security runbooks, automation technologies, and forensic investigations to enhance security measures. Your role will involve establishing a threat intelligence capability, leveraging various sources to drive awareness and improve the organization's defensive posture. You will collaborate with intelligence and incident response teams to analyze security incidents and develop methodologies to enhance threat intelligence capabilities. Furthermore, you will work on vulnerability management, proactive security testing, and enhancing security posture through penetration testing and risk assessment. Your expertise will be crucial in driving efficiencies in Cyber Threat Management responses, reducing overall risk, and improving the organization's security standards. Additionally, you will play a key role in professional development and innovation, staying informed about emerging trends and technologies in cybersecurity and driving collaboration across the organization to address security concerns. To excel in this role, you should possess a Bachelor's degree in a related field, along with 10-15 years of relevant experience in Information Security technologies. Strong knowledge of security monitoring, incident detection, response tools, and security controls frameworks is essential. You should have experience working in a global company, deploying systems or applications, and solving complex cybersecurity problems. Excellent communication skills, analytical mindset, and the ability to work independently and collaboratively are also key requirements for this position. Overall, as the Director, TSG Information Security, Cyber Threat Management, you will lead the organization in enhancing its security posture, driving innovation, and ensuring the protection of digital assets in line with industry standards and best practices.,

Posted 2 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

vadodara, gujarat

On-site

As a Cofounder with investment (Chief Technology Officer - CTO) at Realezi, an Indian real estate technology startup based in Vadodara, Gujarat, you will play a crucial role in leading the technology strategy and implementation. Your responsibilities will involve overseeing the development and dissemination of technology for external customers, driving technological innovation, managing IT infrastructure, ensuring system security, collaborating with other executives, and staying updated on industry trends and advancements. The ideal candidate for this full-time, on-site position should possess strong analytical skills and research abilities, excellent communication skills, leadership and team management experience, advanced knowledge of technology trends and systems security, and the ability to make significant capital investments and manage financial resources effectively. Prior experience in a CTO role or a similar leadership position is advantageous. A Bachelor's or Master's degree in Computer Science, Engineering, or a related field is required. Joining Realezi offers you equity partnership in a rapidly growing startup, the opportunity to shape the future of Prop tech, and a collaborative and dynamic work environment. If you are ready to make a significant impact in the Prop tech space, we encourage you to apply now or connect with us at hr@realezi.com to embark on this exciting journey.,

Posted 2 weeks ago

Apply

1.0 - 5.0 years

0 Lacs

hyderabad, telangana

On-site

You should have a minimum of 1+ years of experience in Linux/UNIX systems administration. Your role will involve building, automating, and supporting mission-critical large-scale infrastructure systems, with a strong focus on Linux, especially the RHEL platform. Additionally, you should have at least 3 years of experience in VMware ESX and VCenter. Experience with NFS using NetApp Storage is required, and you should possess strong debugging skills, with familiarity in kernel debugging being a plus. A good understanding of Linux systems administration is essential, along with experience in scripting languages such as Python and Bash. Automation and config management skills, including Ansible and CFEngine, are necessary for this role. Experience with Red Hat tools like Red Hat Ansible Tower, Satellite, and Red Hat IPA is also preferred. Knowledge of the DevOps space and the ability to write automation using Ansible playbooks/roles is a key requirement. Familiarity with revision control systems such as GitHub and configuration management systems is expected. Understanding of RHEL OS, systems security, and GPG encryption is crucial. Excellent verbal and written communication skills are necessary for effective collaboration within the team. You should be able to adapt to a fast-paced support environment with shifting priorities. An RHCE certification would be a plus for this role. If you meet these qualifications and are looking to join a dynamic team, please share your resume to nsenthil.kumar@genpact.com with the subject "Linux Patching" along with your notice period.,

Posted 2 weeks ago

Apply

2.0 - 12.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Associate Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. As a cybersecurity generalist at PwC, you will focus on providing comprehensive security solutions and experience across various domains, maintaining the protection of client systems and data. You will apply a broad understanding of cybersecurity principles and practices to address diverse security challenges effectively. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us. At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firms growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: We are seeking a professional to join our Cybersecurity and Privacy services team, where you will have the opportunity to help clients implement effective cybersecurity programs that protect against threats, drive transformation, and foster growth. As companies increasingly adopt digital business models, the generation and sharing of data among organizations, partners, and customers multiply. We play a crucial role in ensuring that our clients are protected by developing transformation strategies focused on security, efficiently integrating and managing new or existing technology systems, and enhancing their cybersecurity investments. As an L3 Analyst/SOC Manager, you will be responsible for overseeing regular operations, driving continuous improvement processes, and managing client and vendor interactions. This role involves managing complex incidents escalated from L2 analysts, operating the Security Incident process, and mentoring junior team members to build a cohesive and motivated unit. Responsibilities Review cybersecurity events analyzed by L2 security analysts, serving as the escalation point for detection, response, and remediation activities. Monitor and guide the team in triaging cybersecurity events, prioritizing, and recommending/performing response measures. Provide technical support for IT teams in response and remediation activities for escalated cybersecurity events/incidents. Follow up on cybersecurity incident tickets until closure. Guide L1 and L2 analysts in analyzing events and response activities. Expedite cyber incident response and remediation activities when delays occur, coordinating with L1 and L2 team members. Review and provide suggestions for information security policies and best practices in client environments. Ensure compliance with SLAs and contractual requirements, maintaining effective communication with stakeholders. Review and share daily, weekly, and monthly dashboard reports with relevant stakeholders. Update and review documents, playbooks, and standard operational procedures. Validate and update client systems and IT infrastructure documentation. Share knowledge on current security threats, attack patterns, and tools with team members. Create and review new use cases based on evolving attack trends. Analyze and interpret Windows, Linux OS, firewall, web proxy, DNS, IDS, and HIPS log events. Develop and maintain threat detection rules, parsers, and use cases. Understand security analytics and flows across SaaS applications and cloud computing tools. Validate use cases through selective testing and logic examination. Maintain continuous improvement processes and build/groom teams over time. Develop thought leadership within the SOC. Mandatory Skill Sets Bachelors degree (minimum requirement). 2-8 years of experience in SOC operations. Experience analyzing malicious traffic and building detections. Experience in application security, network security, and systems security. Knowledge of security testing tools (e.g., BurpSuite, Mimikatz, Cobalt Strike, PowerSploit, Metasploit, Nessus, HP Web Inspect). Proficiency in common programming and scripting languages (Python, PowerShell, Ruby, Perl, Bash, JavaScript, VBScript). Familiarity with cybersecurity frameworks and practices (OWASP, NIST CSF, PCI DSS, NY-DFS). Experience with traditional security operations, event monitoring, and SIEM tools. Knowledge of MITRE or similar frameworks and procedures used by adversaries. Ability to develop and maintain threat detection rules and use cases. Preferred Skill Sets Strong communication skills, both written and oral. Experience with SMB and large enterprise clients. Good understanding of ITIL processes (Change Management, Incident Management, Problem Management). Strong expertise in multiple SIEM tools and other SOC environment devices. Knowledge of firewalls, IDS/IPS, AVI, EDR, Proxy, DNS, email, AD, etc. Understanding of raw log formats of various security devices. Foundational knowledge of networking concepts (TCP/IP, LAN/WAN, Internet network topologies). Relevant certifications (CEH, CISA, CISM, etc.). Strong work ethic and time management skills. Coachability and dedication to consistent improvement. Ability to mentor and encourage junior teammates. Knowledge of regex and parser creation. Ability to deploy SIEM solutions in customer environments. Years Of Experience Required 2-12 + years Education Qualification B.Tech Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering Degrees/Field Of Study Preferred Certifications (if blank, certifications not specified) Required Skills SoCs Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Azure Data Factory, Communication, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture, Security Compliance Management, Security Control, Security Incident Management, Security Monitoring + 3 more Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship No Government Clearance Required No Job Posting End Date Show more Show less

Posted 1 month ago

Apply

0.0 - 4.0 years

0 Lacs

noida, uttar pradesh

On-site

Are you our TYPE Monotype brings brands to life through type and technology that consumers engage with every day. The company's rich legacy includes a library that can be traced back hundreds of years, featuring famed typefaces like Helvetica, Futura, Times New Roman, and more. Monotype also provides a first-of-its-kind service that makes fonts more accessible for creative professionals to discover, license, and use in our increasingly digital world. Working with the biggest global brands and individual creatives, Monotype offers a wide set of solutions that make it easier for them to design beautiful brand experiences. Monotype Solutions India, a strategic center of excellence for Monotype, is a certified Great Place to Work three years in a row. The focus of this fast-growing center spans various areas such as Product Development, Product Management, Experience Design, User Research, Market Intelligence, Research in Artificial Intelligence and Machine learning, Innovation, Customer Success, Enterprise Business Solutions, and Sales. Headquartered in the Boston area of the United States and with offices across 4 continents, Monotype is the world's leading company in fonts. Monotype is looking to hire an Information Security Trainee to join its team. The selected candidate will be responsible for performing security investigations, coordinating breach response, and maintaining the security monitoring infrastructure. While experience is not mandatory, candidates with relevant experience in the role will be considered. The candidate will collaborate with internal Information Technology, Product Assurance, Engineering, and Tech Stack Vendors. Opportunity: - Analyze threat information from multiple sources and disciplines across the Intelligence Community. - Synthesize intelligence information and draw insights about possible implications. - Identify vulnerabilities and potential for exploitation in collected information. - Assess cyber criminals or foreign intelligence entities" capabilities and activities to support investigations or activities. - Respond to urgent situations to mitigate immediate and potential threats. - Investigate and analyze response activities. - Assist in malware remediation and configuration auditing of network and operating systems. Requirements: - Understanding of network, systems, application, and cloud security, particularly with AWS. - Knowledge of information security concepts. - Strong technical communication and analytical skills. - Excellent time management, organization, and creative problem-solving skills. - Effective oral and written communication, along with strong presentation skills. - Bachelor's degree in computer science/information technology/information security or equivalent. - Proficiency in one or more languages such as German, Japanese, French, or Spanish is desirable for this role. Monotype offers a dynamic global work environment with opportunities for growth and learning. Join us in our mission to bring brands to life through innovative type and technology solutions.,

Posted 1 month ago

Apply

5.0 - 9.0 years

0 Lacs

pune, maharashtra

On-site

As a Security Engineer at Rapid7, you will play a crucial role in building, integrating, and automating security controls across a variety of environments. Your primary responsibility will be to enhance global technology security by designing and implementing robust security solutions. Joining our IT team, you will collaborate with a group of dedicated professionals who are committed to advancing technology security across different business verticals. Your role will involve driving the design and integration of security controls, managing IT infrastructure vulnerabilities, and providing security consulting to various business units. Key responsibilities include building, integrating, and automating security controls from cloud to endpoint, serving as a subject matter expert in enhancing IT security for end-user devices, infrastructure, applications, and identity/access management. You will also be involved in automating vulnerability management and incident detection/response, leading and collaborating on security projects, and curating metrics to demonstrate security control effectiveness. To excel in this role, you are expected to bring at least 5 years of experience in information security, particularly in areas such as vulnerability management, incident detection/response, digital forensics, or malware analysis. Additionally, proficiency in software development with Python or Go, strong knowledge of Windows, macOS, & Linux security hardening/monitoring, expertise in secure network, systems, and application design/architecture, and experience in maintaining AWS cloud infrastructure will be valuable assets. Moreover, your ability to identify security event root causes from disparate systems, excellent communication skills with technical and non-technical audiences, a proactive mindset, and a strong curiosity for staying updated on emerging threats and industry trends are essential qualities for success in this role. At Rapid7, we value diverse perspectives and experiences, and if you are passionate about cybersecurity and eager to contribute to creating a secure digital world, we encourage you to apply and be a part of our dynamic team.,

Posted 1 month ago

Apply

5.0 - 9.0 years

0 Lacs

hyderabad, telangana

On-site

As a SAP Basis HANA Professional at YASH Technologies, you will be responsible for one end-to-end implementation of ECC and S4HANA, with a strong focus on Application Maintenance Support (AMS) projects. With a minimum of 5 to 7 years of experience, you will demonstrate expertise in configuring Fiori Launchpad, upgrading the HANA Database, and analyzing Hana Alerts, traces, and logs. Additionally, hands-on experience in S/4 Cloud integrations, BTP administration, and deployment of applications in sub-accounts will be essential. Your role will also involve the installation and configuration of Solution Manager, LMDB, maintenance planner, SLD, Managed system configuration, EWA Configuration, Technical monitoring, Job monitoring, and Web Dispatcher. You will be responsible for performing DB Backups and Recoveries, EHP and HANA Version Upgrades, as well as overseeing Operating Systems, Databases, and Networks. Knowledge in Authorizations concepts, System security topics, System health checks, transport management, Client/System Refresh, Batch scheduling, and SAP Certification will be advantageous. Communication skills will be crucial as you will extensively interact with client users, demonstrating excellent verbal and written abilities while leading project teams. At YASH Technologies, you will have the opportunity to shape your career path within an inclusive team environment. Our Hyperlearning workplace is built on principles of flexible work arrangements, emotional positivity, self-determination, trust, transparency, open collaboration, and all necessary support for achieving business goals. Join us for a stable employment with a great atmosphere and ethical corporate culture where continuous learning and growth are encouraged.,

Posted 2 months ago

Apply

5.0 - 8.0 years

15 - 25 Lacs

Gandhinagar

Work from Office

Position Summary The Network Security Engineer plays a critical role in safeguarding our organization's sensitive data and maintaining the integrity of our network infrastructure. This role focuses on implementing, managing, and monitoring network security solutions to ensure compliance with industry standards such as PCI-DSS, NIST, ISO 27001, HIPAA and some others. Will conduct regular security assessments, including firewall reviews and vulnerability analysis, and provide recommendations for enhancing our security posture, additionally will be required to conducting regular WIFI security reviews. This position requires a strong understanding of network security principles, hands-on experience with technologies such as: FIREMON, Palo Alto firewalls, Cisco switches, and other network security technologies. Job Description Manage and optimize security tools including FIREMON, Palo Alto firewalls, and Cisco infrastructure Identify and respond to security incidents, compromised assets, and potential threats Monitor network traffic patterns and analyze security events using IDS/IPS systems Perform real-time security monitoring and incident response Handle security request related but not limited to troubleshootings, enrollment, reports, investigations, etc. Technical analysis of network activity; monitors and evaluates network flow data and signature-based IDS events. Recommend new IDS signatures and detection strategies. Monitor and report on trends and activity on network sensor platforms. Review daily Firewall logs. Review Firewall rules. Conduct monthly audit on WIFI SSID and users. Conduct quarterly WIFI scan and analysis. Note: The candidate should have exp in Security Audit & Compliance Shift: Rotational (Including Night Shfit)

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies