Jobs
Interviews

24 Technical Security Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 9.0 years

0 Lacs

ahmedabad, gujarat

On-site

As a Senior Cloud Consultant - Technical Security at Oracle Global Services Center (GSC), you will be a key player in implementing Oracle Cloud Applications for top global customers across various regions. Operating within the Global Blended Delivery model involving onshore and offshore teams, you will be responsible for developing solutions to complex requirements, conducting Proof of Concepts, configuring applications, performing validations, designing custom solutions including integrations, reports, conversions, extensions, and ensuring security measures are in place. Your role will also involve actively participating in internal and external professional communities, developing industry best practices, contributing to asset harvesting, and investing in tools development. Additionally, you may be expected to groom, coach, and mentor teams as well as take on people manager responsibilities. Qualifications: - BE/MBA (Fin/SCM preferred) - 5 to 8 years of total experience with 2 to 3 years in Oracle EBS/Cloud ERP Applications implementation - Experience in Technology, Infrastructure, Finance, Accounting, and Risk Management - Preference for Cloud Risk Management & Compliance implementation experience - Proficiency in Technical Security areas covering Cloud Security (OCI, Azure, AWS, GCP) - Experience in implementing federated SSO access with third party IdaaS Identity Providers - Understanding and experience in Identity Governance and Administration (IGA) tools - Implementation knowledge of Threat Governance, Security Posture Management tools, WAF, SIEM integration, and Access Control Lists - Ability to translate business requirements into implementable security scope items - Implement Advanced Access Control as part of Oracle Risk Management Cloud Soft Skills: - Excellent communication skills (both written & verbal) - Good interpersonal skills with the ability to build rapport with stakeholders - Ability to present ideas and solutions clearly & concisely - Self-motivated with a lot of energy and drive - Strong team player with good analytical skills Join Oracle, a world leader in cloud solutions, and be part of a diverse and inclusive workforce that promotes opportunities for all. Benefit from competitive benefits, flexible medical, life insurance, and retirement options, while contributing to volunteer programs that give back to communities. We are committed to including people with disabilities at all stages of the employment process, providing accessibility assistance or accommodation when needed.,

Posted 1 week ago

Apply

3.0 - 7.0 years

14 - 16 Lacs

Bengaluru

Work from Office

Role & responsibilities Maintain, coordinate, and project manage, upgrades, conversions and service all systems involving alarms, access control, video cameras, burglar alarms, radio systems, and all other types of physical security equipment. Ensuring APAC studios are aligning with standards and processes involving physical security systems, required upgrades, maintenance and day to day operation. Interact with external and internal partners to ensure the viability of security systems, legacy and new, with the goal of minimal business disruption as the result of failed or improperly configured systems. Assist in the implementation of technology solutions aligned with corporate security goals and budget guidelines. Perform operational processes to ensure security standards are maintained. Administer audits for various access control systems. Act as a primary contact for physical security system issues for Asia/Pacific offices and studios, and secondary contact for company sites in other regions. Project planning, tracking and quality assurance and overall vendor communication, troubleshooting and management. Assists in annual security systems budgeting process. Manage, design, and implement physical security system projects for new builds, renovations, and upgrades in collaboration with IT, Workplace Services, external vendors and others. Ensure alignment, knowledge sharing, collaboration among key business partners. Conduct physical security surveys, security assessments and prepare written and verbal reports identifying discrepancies, recommendations for alternative security measures and actions as appropriate. Manage 3rd party security vendors to ensure high quality service delivery, and document service delivery shortcomings and failures. Perform commissionings with closing documentation and required reports. Support and supervise field system maintenance / inspections related to break-fix and compliance requirements. Maintain proficiency in various physical security systems, including but not limited to Lenel, Avigilon Alta Aware, Bosch, 2N, Axis, and others. Preferred candidate profile Project management experience. Bachelor's degree or trade school related to security systems or in a similar field. Minimum of 3 years experience with installation, configuration and programming experience, with Lenel, or similar enterprise systems. Knowledge of network topology and general networking skills. CPP or PSP certifications, or other relevant certifications are helpful.

Posted 3 weeks ago

Apply

4.0 - 8.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Vulnerability Identification & Assessment: Manage and oversee vulnerability scanning tools (Qualys, Tenable, Rapid7, etc.). Analyze vulnerability data from multiple sources and assess the impact on business operations. Perform risk assessments and categorize vulnerabilities based on severity and exploitability. Remediation & Risk Mitigation:Collaborate with IT and development teams to ensure timely remediation of identified vulnerabilities. Prioritize vulnerabilities based on risk to the business and potential exploitability. Track remediation efforts and ensure proper closure of security gaps. Process & Policy Development:Define and maintain vulnerability management policies, standards, and procedures. Establish workflows for vulnerability detection, reporting, remediation, and validation. Ensure compliance with security frameworks such as NIST, CIS, ISO 27001, and regulatory standards like GDPR, HIPAA, and PCI-DSS. Security Monitoring & Threat Intelligence Integration:Work with threat intelligence teams to understand emerging threats and vulnerabilities. Ensure vulnerability management aligns with incident response and threat-hunting processes. Continuously enhance detection mechanisms to improve vulnerability discovery and response. Compliance & Audit Readiness:Ensure that vulnerability management practices align with regulatory and compliance requirements. Maintain records of assessments, remediation efforts, and compliance reports for audits. Support internal and external audits related to vulnerability management. Reporting & Metrics: Develop and present vulnerability status reports to security leadership and executive teams. Track key performance indicators (KPIs) related to vulnerability remediation SLAs and risk reduction Provide insights on security posture improvements based on trend analysis. Security Awareness & Collaboration:Conduct training sessions to educate teams on vulnerability risks and remediation best practices. Work closely with DevSecOps, SOC, and infrastructure teams to integrate security best practices into the development lifecycle Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Vulnerability Management Preferred technical and professional experience Qualys

Posted 3 weeks ago

Apply

0.0 - 2.0 years

1 - 4 Lacs

Vadodara

Work from Office

Monitoring their FTR trends, identifying training gaps and regular trainings, the role would involve coordination for mapping issues and technical issues, the role would own end to end the TAT servicing by the CO structure to the sales teams. "1 Maintain TAT of 24hours for all assigned credit underwriting at branch 2 Ensure monthly trainings of Branch Loan officers on latest product updates3 Maintain FTR of the branch at 90% levels through daily briefings on file wise errors4 Ensure branch compliances by pointing deficiencies to RM ICQ5 Detailed RCA for OD cases6 Acting in the role of Branch manger in his absence for the purposes of cash deposition and Disbursement. " Qualification : Graduate in any discipline

Posted 3 weeks ago

Apply

3.0 - 6.0 years

15 - 25 Lacs

Bengaluru

Work from Office

The Opportunity Are you a highly skilled and proactive security expert with a passion for identifying risks and enhancing security postures? If so, you will join a dynamic team at Nutanix focused on ultimately improving the security and compliance of our products through research, analysis, and the development of cutting-edge solutions. This role offers the opportunity to operate key security tools, create response playbooks, and collaborate across teams to address security gaps and issues, contributing significantly to the overall security framework of the organization. About the Team At Nutanix, you will have the opportunity to be a part of the Security and Compliance team, which consists of approximately 10-15 members located across India and the US. The team culture at Nutanix is focused on engagement, employment development, inclusion, and the continuous pursuit of learning and growth. Collaboration, innovation, and a strong sense of teamwork are valued within the team, creating a supportive and dynamic work environment. You will report to the Manager of Engineering in this role. The work setup at Nutanix is a hybrid model, requiring employees to be in the office three days a week. This setup allows for a balance between in-person collaboration and remote work flexibility, fostering creativity and productivity. Travel requirements for this role are not applicable, as the position is primarily based out of the office and does not involve frequent travel. With Nutanix's focus on providing a conducive and inclusive work environment, you can expect support and resources to excel in your role within the Security and Compliance team Your Role Utilize your expertise as a Security Analyst to proactively identify and respond to security incidents within the organization. Take charge of vulnerability management efforts, ensuring timely identification and mitigation of potential security risks. Leverage your skills in SIEM and automation to streamline security operations and improve response times. Serve as a thought leader, effectively communicating and garnering support for innovative security ideas and strategies. Provide mentorship and guidance to junior staff, and collaborate with various teams on special security projects to contribute to the organization's overall security posture. Experience with cloud security and automation is a must What You Will Bring Must have an engineering background Should possess 3-6 years of experience Highly motivated, able to take ownership of tasks and see through completion. Must be well organized and able to leverage best practices, able to thrive in fast-paced environment, and, most importantly, have the ability to approach problems with an innovative, can-do attitude Ability to establish priorities, work independently and proceed with objective. Strong communication skills to work with both collaborative cross-functional team of peers and departments within the company. Experience deploying and managing various security technologies including system scanning, network security, SIEM, automation, etc Should have skills in Linux security, Cloud security, Automation, Incident response, and be able to clearly communicate security technology to developers Experience with cloud technologies Knowledge of enterprise logging, with a focus on security event logging. Strong understanding of security operations concepts Proven expertise with networking protocols Experience working with Cloud Architecture standards and processes. Must have Python scripting knowledge - using APIs and parsing JSON Work Arrangement Hybrid: This role operates in a hybrid capacity, blending the benefits of remote work with the advantages of in-person collaboration. For most roles, that will mean coming into an office a minimum of 3 days per week, however certain roles and/or teams may require more frequent in-office presence. Additional team-specific guidance and norms will be provided by your manager.

Posted 3 weeks ago

Apply

2.0 - 3.0 years

1 - 2 Lacs

Kolkata

Work from Office

Responsibilities: * Respond to alarms promptly * Install, maintain, and monitor CCTV systems * Follow safety protocols at all times * Test fire alarm system regularly * Collaborate with security team on incident response

Posted 4 weeks ago

Apply

4.0 - 8.0 years

10 - 15 Lacs

Hyderabad

Work from Office

Senior SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This Senior SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Senior SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack Preferred technical and professional experience Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred ExperienceExperience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures

Posted 4 weeks ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Bengaluru, Thiruvananthapuram

Work from Office

C, QNX, Linux, Kernel, Device Drivers, MACSec, BSP, SoC Cybersecurity, Secure Boot, Cryptography, OPTEE, Penetration testing. Required Skills Technical Security concept and Software Security concept. Vulnerability analysis (System and Software). Threat analysis and risk assessment, Threat modelling. Security Testing like Fuzz and Penetration testing. Expertise in MACSec concepts. Good understanding of HSM, Secure boot, Secure updates, cryptographic libraries, True Random number generator, Signing (ECDSA, RSA). Good understanding on OPTEE OS, ARM Trusted Firmware, E-fusing. Aware of Crypto terminologies like encryption (AES, ECC), signing (ECDSA, RSA), Hash (SHA-256). Understanding on RFS protection like dm-verity. Ability to work in a fast-paced environment building hardware and software products. Good knowledge on Yocto framework is added advantage. Preferred Skills Experience in Automotive domain. Experience in Linux build systems: Yocto. Real-time systems programming experience considered an asset. Experience with developing safety ISO26262 certified BSP and product considered an asset. Experience in design tools such as EA and Rhapsody. Contributions to Linux kernel and other open-source projects.

Posted 1 month ago

Apply

7.0 - 12.0 years

4 - 8 Lacs

Noida

Work from Office

We are looking for a skilled Senior Security Technical Analyst to join our team in Bangalore. The ideal candidate will have 7 to 12 years of experience in Information Security, with at least 3 years focused on SaaS security or cloud platforms. Roles and Responsibility Ensure ongoing discovery and classification of SaaS usage across the organization, leveraging CASB and other telemetry to identify unsanctioned platforms. Implement and validate controls to ensure all SaaS platforms meet minimum security requirements, such as SSO, MFA, RBAC, logging, IP restrictions, and encryption. Oversee proper identity and access controls, secure API integrations, and enforcement of data classification, retention, and encryption policies. Monitor, alert, and incident readiness for SaaS platforms, ensuring logs integration with enterprise SIEM (e.g., Splunk) and real-time alerting. Maintain visibility into SaaS configurations, ensuring changes follow Broadridge change control standards and verifying lower environments are also governed appropriately. Conduct technical risk assessments for SaaS vendors and support incident response procedures. Job Bachelor's degree in computer science, information technology, or a related field. Minimum 7 years of experience in Information Security, with at least 3 years focused on SaaS security or cloud platforms. Strong understanding of SaaS-specific risks, architecture, and controls. Experience working with CASB, SSPM, and SIEM tools (e.g., Microsoft Defender, Splunk). Understanding of identity and access management in the context of SaaS platforms and integrations with other systems. Excellent written and verbal communication skills, with the ability to articulate technical topics clearly. Strong analytical skills and attention to detail. Ability to work independently in a global, matrixed organization. Comfortable working in rotational shifts and managing competing priorities. Preferred CertificationsCCSK, CRISC, CISA, ISO 27001, or similar cloud/security-related certifications. Experience working in financial services or other highly regulated environments.

Posted 1 month ago

Apply

4.0 - 8.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Senior SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This Senior SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Senior SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack. Preferred technical and professional experience Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred ExperienceExperience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures

Posted 1 month ago

Apply

4.0 - 8.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Analyze and triage security incidents to determine their severity and impact on Infrastructure systems. Primary point of contact for Cyber Security Incident response in the Cyber Security Escalations team. Provide a first point of contact for L3 security escalations from the SOC team, ensuring a thorough review, escalation Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Conduct in-depth analysis of security events, collaborating directly with different stakeholders to escalate and thoroughly investigate incidents. Participate in Security Incident Response Team in the identification, containment, eradication, and resolution of security issues, This involves understanding the scope, impact, and root cause of incidents to tailor the response effectively, Collaborate with SOC teams to ensure effective incident response and continuous improvement. Assist in the development and refinement of SOC processes, procedures, and playbooks, Create and maintain incident reports, documenting findings, actions taken, and lessons learned Preferred technical and professional experience Stay current with emerging threats, vulnerabilities, and security technologies to proactively protect the organization. Notify Client of incident and required mitigation works. Track and update incidents and requests based on client’s updates and analysis results. Good understanding on Phishing email analysis and their terminologies Having knowledge on EDR solutions (Preferred CrowdStrike), Participate in regular SOC team meetings and provide input on improving security posture. Communicate vertically and horizontally to keep stakeholders informed and involved on Security Operations matters

Posted 1 month ago

Apply

1.0 - 5.0 years

2 - 3 Lacs

Mumbai

Work from Office

– SENIOR VICE PRESIDENT/ VICE PRESIDENT – IT/IS/TECHNOLOGY COMPLIANCE JOB TITLE Senior Vice President/ Vice President – IT/IS/Technology Compliance – M8/M7 DEPARTMENT Compliance REPORTING TO President & Chief Compliance Officer JOB PURPOSE Compliance Risk Assessment & Assurance MAJOR ACTIVITIES Ensuring compliance and governance is met with regulatory requirements and drive IT compliance agenda Assess the compliance risk and technical security controls for on-prem and cloud-based solutions and identify the associated cyber/information security risks and compliance requirements Recommend measures/controls to mitigate the information security risk and compliance to regulatory/statutory requirements Conducting a continuous assessment of current Technology and Security practices and systems in identifying continuous improvement areas Driving change projects and building new IT Compliance capabilities Managing numerous information sources and providing data analysis reports to senior management Supporting the CCO report to the Board and being an active member of the senior management team Flexible and adaptable capable of changing direction where required and showing flexibility to meet new demands Coordinating the Regulatory IT audits from a compliance perspective Building and maintaining relationship with regulators RELEVANTEXPERIENCE Should have Core IT Audit / IT Security Audit/ Technology and Infrastructure experience.Experience about banking regulations in these areas would be an advantage Familiarity with regulators and regulations Digital leadership skills capable of empowering and leading an IT enable team members to meet business and IT security goals A Chartered Accountant with relevant experience. Someone with Engineering and Technology/IT Services background will be an added advantage. Should have experience across(a) Internal Audit, (b) CISO, (c) IT Security, (d) Cyber Security (e) Banking Compliance Should have strong people and external stakeholder management skills. He/she should be a good coach and mentor to team members. Creative thinking able to look at alternatives and should be solution oriented Should have the ability to multitask and adhere to timelines. Should also bring good energy levels for change management and focus on new initiatives. PERSONAL CHARACTERISTICS & BEHAVIOURS Good oral and written communication skills Strong analytical and creative problem-solving skills Eye for detail and a quick learner Catching up with the Technology evolution – Categorization, Bucketing, Automation and Digitalization, from a Technology perspective

Posted 1 month ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

Bengaluru

Work from Office

SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack Preferred technical and professional experience Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred Experience: Experience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures

Posted 1 month ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

Kochi

Work from Office

SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred Experience: Experience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures Preferred technical and professional experience SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis

Posted 1 month ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Bengaluru

Work from Office

Vulnerability Identification & Assessment: Manage and oversee vulnerability scanning tools (Qualys, Tenable, Rapid7, etc.). Analyze vulnerability data from multiple sources and assess the impact on business operations. Perform risk assessments and categorize vulnerabilities based on severity and exploitability. Remediation & Risk Mitigation: Collaborate with IT and development teams to ensure timely remediation of identified vulnerabilities. Prioritize vulnerabilities based on risk to the business and potential exploitability. Track remediation efforts and ensure proper closure of security gaps. Process & Policy Development: Define and maintain vulnerability management policies, standards, and procedures. Establish workflows for vulnerability detection, reporting, remediation, and validation. Ensure compliance with security frameworks such as NIST, CIS, ISO 27001, and regulatory standards like GDPR, HIPAA, and PCI-DSS. Security Monitoring & Threat Intelligence Integration: Work with threat intelligence teams to understand emerging threats and vulnerabilities. Ensure vulnerability management aligns with incident response and threat-hunting processes. Continuously enhance detection mechanisms to improve vulnerability discovery and response. Compliance & Audit Readiness: Ensure that vulnerability management practices align with regulatory and compliance requirements. Maintain records of assessments, remediation efforts, and compliance reports for audits. Support internal and external audits related to vulnerability management. Reporting & Metrics: Develop and present vulnerability status reports to security leadership and executive teams. Track key performance indicators (KPIs) related to vulnerability remediation SLAs and risk reduction Provide insights on security posture improvements based on trend analysis. Security Awareness & Collaboration: Conduct training sessions to educate teams on vulnerability risks and remediation best practices. Work closely with DevSecOps, SOC, and infrastructure teams to integrate security best practices into the development lifecycle Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Vulnerability Management Preferred technical and professional experience Qualys

Posted 1 month ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Kochi

Work from Office

Information and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analysing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client's organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world. The ability to be a team player, Strong communication collaboration Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Application Security, Threat Modelling, Secure Code Review, Penetration Testing, Vulnerability Testing, SAST (Static Application Security Testing), DAST (Dynamic Application security Testing), DevSecOps Implemented Clean Code principles, JUnit’s * Java development, JavaScript, Python, Ruby, C++/C#, Perl etc Must have strong business acumen with ability to work with application development, QA and security teams. A strong understanding of application security frameworks The ability and skill to train other people in procedural and technical topics As a Security Consultant, you will be a key advisor for IBM’s clients, analysing business requirements to design and implement the best security solutions for their needs Preferred technical and professional experience Must have a solid understanding of application security code reviews and penetration testing & Experience with enterprise java technologiesSpring, JUnit, Hibernate 4+ years' experience in application development and security. Practical understanding and use of commercial application security tools

Posted 1 month ago

Apply

4.0 - 8.0 years

10 - 15 Lacs

Bengaluru

Work from Office

The SIEM Administrator will be responsible for administering the deployed SIEM service. The candidate is also expected to have hands on experience of deploying a SIEM solution from scratch, where the candidate should have the skills and knowledge to gather all the required information to build the SIEM solution. In-depth knowledge of technical approaches in security analytics, monitoring and alerting. Maintains technical knowledge within areas of expertise. This role is also responsible for identifying, analyzing, developing new or tuning & Refinement of the content or use cases. Strong problem solving and troubleshooting skills including the ability to perform root cause analysis for preventative investigation Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Should have experience in any of the query language i.eAQL ,KQL, SPL, LEQL etc for writing the complex queries & saved search creation. Should have strong knowledge of different cybersecurity frameworks i.e.MITRE, NIST and Cyber kill chain model. Should have understanding of regular expression writing and custom parsing Preferred technical and professional experience Collaborate with key stakeholders within technology, application and cyber security to develop use cases to address specific business needs. Create technical documentation around the content deployed to the SIEM. Creates and develops correlation and detection rules with SIEM solution, reports & dashboards to detect emerging threats

Posted 1 month ago

Apply

6.0 - 8.0 years

11 - 16 Lacs

Bengaluru

Work from Office

Were looking for a skilled and motivated Technical Specialist with expertise in cloud technologies, security best practices, and DevOps methodologies to help shape and lead impactful initiatives across our global platforms. You will play a pivotal part in designing and implementing cutting-edge solutions, working closely with cross-functional teams worldwide. Youll be at the forefront of driving automation, enhancing system reliability, and delivering meaningful results in a fast-paced, agile environment. You have: BE / Master's Degree in Computer Science or related technical discipline, or equivalent practical experience with 6-8 years of experience in software design, development, and testing Working experience with public or private cloud environments, including any of the following platformsAmazon AWS EKS, Red Hat OpenShift, Google GCP GKE, Microsoft Azure AKS, VMware Tanzu, or open-source Kubernetes Strong Python development skills, with experience in DevOps practices, working in a Jenkins-based environment, and familiarity with test frameworks like Radish and Cucumber Experience with container technologies (Docker or Podman) and Helm charts Expertise in container management environments (e.g., Kubernetes, service mesh, IAM, FPM) It would be nice if you also had: Experience in functional and system testing, software validation/reviews, and providing technical support during platform deployment and product integration Knowledge in configuring and managing security vulnerability scans, including container vulnerability scanning (e.g., Anchor), port scanning (e.g., Tenable), and malware scanning (e.g., Symantec Endpoint Protection) Experience in researching solutions to security vulnerabilities and applying hands-on mitigation strategies Lead & perform development activities of medium/high complexity features. Architect, design, develop, and test scalable software solutions Own and lead feature development and contribute to process improvements Collaborate with peers to resolve technical issues and review design specs Build and automate tests using frameworks like Radish, Cucumber, etc.

Posted 1 month ago

Apply

2.0 - 5.0 years

4 - 8 Lacs

Mumbai

Work from Office

Your day at NTT DATA The Security Managed Services Engineer (L3) is a seasoned engineering role, responsible for providing a service to clients by proactively identifying and resolving technical incidents and problems. Through pre-emptive service incident and resolution activities, as well as product reviews, operational improvements, operational practices, and quality assurance this role will maintain a high level of service to clients. The primary objective of this role is to ensure zero missed service level agreement (SLA) conditions and is responsible for managing tickets of high complexity, conducts advanced and complicated tasks, aware of client's high level and low-level security architecture and provides resolution to a diverse range of complex problems. This position uses considerable judgment and independent analysis within defined policies and practices and applies analytical thinking and deep technical expertise in achieving client outcomes, while coaching and mentoring junior team members across functions. The Security Managed Services Engineer (L3) may also contribute to support on project work as and when required. What you'll be doing Key Responsibilities: Advanced Cyber Analytics, Proactively drive hunting and analysis against the dataset available for customers Work with our security operations center (SOC) and take the lead role in threat detection and incident response activities Leverage internal and external resources to research threats, vulnerabilities, and intelligence on various attackers and attack infrastructure Use Big Data Analytics platform to identify threats, determine root cause, scope, and severity of each and compile/report findings Work with Threat Intelligence and Malware solutions to identify threats, develop or recommend countermeasures, and perform advanced network and host analysis in the event of a compromise Leveraging tactical and technical intelligence for eradication of threats Characterize suspicious binaries and be able identify traits, C2, and develop network and host-based IOCs Identify potential malicious activity from memory dumps, logs, and packet captures Through review and analysis of cyber threats, provide both internal & external parties key information to respond to threat Participate as part of a close team of technical specialists on coordinated responses and subsequent remediation of security incidents Interface with customers on a daily basis to consult with them on best security practices and help them mature their security posture Create Threat Models based on Mitre ATT&CK framework and cyber kill chain for customers Linking of threat models with SIEM use cases and hunting exercises Basic Malware Analysis Work with SOAR platforms to generate and configure orchestration workflows and responses Academic Qualifications and Certifications: Bachelor's degree or equivalent qualification in IT/Computing (or demonstrated equivalent work experience) Required Experience: Seasoned Managed Services experience handling complex Security Infrastructure. Seasoned experience required in Engineering function within a medium to large ICT organization. Seasoned working knowledge of ITIL processes. Seasoned experience working with vendors and/or 3rd parties. Workplace type : On-site Working

Posted 1 month ago

Apply

2.0 - 5.0 years

4 - 7 Lacs

Bengaluru

Hybrid

Your day at NTT DATA The Security Managed Services Engineer (L3) is a seasoned engineering role, responsible for providing a service to clients by proactively identifying and resolving technical incidents and problems. Through pre-emptive service incident and resolution activities, as well as product reviews, operational improvements, operational practices, and quality assurance this role will maintain a high level of service to clients. The primary objective of this role is to ensure zero missed service level agreement (SLA) conditions and is responsible for managing tickets of high complexity, conducts advanced and complicated tasks, aware of client's high level and low-level security architecture and provides resolution to a diverse range of complex problems. This position uses considerable judgment and independent analysis within defined policies and practices and applies analytical thinking and deep technical expertise in achieving client outcomes, while coaching and mentoring junior team members across functions. The Security Managed Services Engineer (L3) may also contribute to support on project work as and when required. What you'll be doing Key Responsibilities: Ensures that assigned infrastructure at the client site is configured, installed, tested, and operational Performs necessary checks, apply monitoring tools and respond to alerts. Identifies problems and errors prior to or when it occurs and logs all such incidents in a timely manner with the required level of detail. Assists in analyzing, assigning, and escalating support calls. Investigates third line support calls assigned and identify the root cause of incidents and problems Reports and escalates issues to 3rd party vendors if necessary. Provides continuous feedback to clients and affected parties and update all systems and/or portals as prescribed by the company. Proactively identifies opportunities for work optimization including opportunities for automation of work. Coaches L2 teams for advance technical troubleshooting and behavioral skills. May manage and implement projects within technology domain, delivering effectively and promptly per client agreed upon requirements and timelines. May work on implementing and delivering Disaster Recovery functions and tests. Performs any other related task as required. Knowledge and Attributes: Ability to communicate and work across different cultures and social groups Ability to plan activities and projects well in advance and takes into account possible changing circumstances. Ability to maintain a positive outlook at work. Ability to work well in a pressurized environment. Ability to work hard and put in longer hours when it is necessary. Ability to apply active listening techniques such as paraphrasing the message to confirm understanding, probing for further relevant information, and refraining from interrupting. Ability to adapt to changing circumstances. Ability to place clients at the forefront of all interactions, understanding their requirements, and creating a positive client experience throughout the total client journey. Academic Qualifications and Certifications: Bachelor's degree or equivalent qualification in IT/Computing (or demonstrated equivalent work experience) Relevant certifications depending on technology domain expertise such as (but not limited to) - CCNP in Security or PCNSE certification or Firewall Vendor related certification is good to have along with advance technical certification like CCIE, CISSP. Required Experience: Seasoned Managed Services experience handling complex Security Infrastructure. Seasoned experience required in Engineering function within a medium to large ICT organization. Seasoned working knowledge of ITIL processes. Seasoned experience working with vendors and/or 3rd parties.

Posted 1 month ago

Apply

4.0 - 8.0 years

6 - 11 Lacs

Bengaluru

Work from Office

Bachelor's degreein Computer Science, InformationTechnology, orarelated field. Good to havemasters degreein computer science. 7+years of experiencein Azurenet working andsecurity. ITIL Foundation Certified Strong understanding of networking concepts,including TCP/IP,routing, andfirewalls. Experiencewith Azurenet workingservices,including VNet,NSGs,and AzureFirewall. Experience with Azure security concepts, includingidentity and access management (IAM)and security bestpractices. Experience with troubleshooting network and securityissues. Excellent communication and interpersonal skills. Strong analytical and problem-solving skills. Ability to work independently andaspart ofateam. Relevant certification like FortiGateCertified, AzureSecurity, AzureADetc. What you ll do: Design and configureAzure virtualnetworks (VNet) , subnets , androutingtables. Implement Azure network security solutions,including Azure Firewall / 3rd party NGFWs such as Fortigate, checkpoint, Palo Alto, Network Security Groups(NSGs), and Azure Active Directory (AAD) authentication. Troubleshootnetwork andsecurityissues ,includingconnectivity problems, security vulnerabilities, andperformance bottlenecks. Follow ITIL framework to trackall kindofrequest Stay up-to-date onthelatest Azurenet workingand security technologies. Document andmaintain Azurenetwork and security configurations. Workwith other ITteams tointegrate Azurenet working andsecurity solutions into enterprisesystems. Provide training and support to other ITstaff on Azurenetworking andsecurity

Posted 1 month ago

Apply

5.0 - 10.0 years

6 - 10 Lacs

Gurugram

Work from Office

AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. AtAHEAD, we prioritize creating a culture of belonging,where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer,anddo not discriminatebased onan individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, maritalstatus,or any other protected characteristic under applicable law, whether actual or perceived. We embraceall candidatesthatwillcontribute to the diversification and enrichment of ideas andperspectives atAHEAD. We are seeking a highly skilled Senior Network Security Engineer with deep expertise in Cisco Secure products and solutions to join our growing professional services team. This role will lead security architecture design, deployment, and optimization engagements for enterprise and service provider clients. The ideal candidate is a hands-on engineer and trusted advisor, capable of driving strategic security initiatives while delivering high-impact solutions based on Ciscos security portfolio. Key Responsibilities Ability to communicate and execute architecture strategy & approach in clear, concise, and understandable terms to client senior management and other client stakeholders. Ability to implement design architecture objectives that align with client demand & business goals. Design and implementation of Cisco security technologies such as Cisco Secure Firewall (FTD/ASA), SecureX, and ISE. Develop and maintain Zero Trust Network Access (ZTNA) strategies across hybrid environments. Serve as a trusted technical advisor, providing security assessments, risk mitigation strategies, and architecture recommendations aligned with customer business objectives. Design, configure, and troubleshoot Cisco ISE for 802.1X authentication, TACACS+, and RADIUS. Define and enforce security policies, segmentation strategies, and threat prevention techniques. Provide technical leadership, mentoring and documentation for internal teams. Excellent communication, presentation, and documentation skills Demonstrated ability to deliver multiple IT projects on time and within budget Required Skills 5+ years of experience in network security engineering or a related field. Expertise Cisco ISE deployments and configurations. Strong knowledge of network security protocols, VPNs, firewalls, and identity-based access controls. Hands-on experience with Zero Trust architectures and Secure Access Service Edge (SASE). Proficiency in troubleshooting network security issues using packet capture and log analysis tools. Previous consulting experience required. Preferred Skills Cisco CCNP Security or CCIE Security certifications. Experience with automation and scripting tools such as Python, Ansible, or Terraform. Strong documentation and communication skills for cross-team collaboration. Experience integrating network security solutions with cloud environments and authentication systems. Why AHEAD: Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between. We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning. USA Employment Benefits include - Medical, Dental, and Vision Insurance - 401(k) - Paid company holidays - Paid time off - Paid parental and caregiver leave - Plus more! See benefits https://www.aheadbenefits.com/ for additional details. The compensation range indicated in this posting reflects the On-Target Earnings (OTE) for this role, which includes a base salary and any applicable target bonus amount. This OTE range may vary based on the candidates relevant experience, qualifications, and geographic location.

Posted 1 month ago

Apply

3.0 - 6.0 years

4 - 7 Lacs

Bengaluru

Work from Office

Experience: 5+ years Reports to: CTO Qualification: BE/ B.Tech /BSC /BCA/ MTech / ME About the Role: We are seeking a skilled and experienced ISMS Lead Implementer to oversee and enhance our Information Security Management System (ISMS). The ISMS Lead Implementer will play a pivotal role in ensuring the confidentiality, integrity, and availability of our information assets. This role requires a proactive individual who can manage compliance with standards like ISO/IEC 27001, conduct risk assessments, and foster a culture of security awareness within the organization. Key Responsibilities: 1. Developing and Implementing ISMS Policies and Procedures: - Analyze organizational security requirements and develop comprehensive policies. - Ensure compliance with standards such as ISO/IEC 27001. - Regularly review and update policies to align with emerging threats and regulatory changes. 2. Conducting Risk Assessments and Management: - Identify potential threats and vulnerabilities to information assets. - Evaluate risks and implement mitigation strategies to safeguard critical information. - Perform periodic risk assessments to ensure ongoing security. 3. Ensuring Legal and Regulatory Compliance: - Stay updated on changes in information security laws and standards. - Advise senior management on compliance requirements and implications. - Implement measures to achieve and maintain compliance. 4. Managing Security Incidents: - Develop and maintain an Incident Response Plan. - Coordinate responses to security incidents, including investigation and corrective actions. - Conduct post-incident reviews to identify areas for improvement. 5. Training and Awareness Programs: - Design and implement training programs to promote a security-conscious culture. - Raise awareness about security policies, roles, and responsibilities across the organization. 6. Monitoring and Reporting: - Monitor adherence to ISMS policies and conduct regular audits. - Report information security statuses and audit findings to senior management. - Recommend improvements based on analysis of trends and assessments. 7. Liaising with External Auditors and Regulators: - Act as the primary contact for external audits and assessments. - Provide required documentation and implement recommended actions to ensure compliance. 8. Managing Information Security Projects: - Plan and execute security initiatives to strengthen the ISMS framework. - Manage project timelines, resources, and evaluate project outcomes. 9. Maintaining Business Continuity and Disaster Recovery Plans: - Develop and test business continuity and disaster recovery plans. - Ensure preparedness for unforeseen disruptions and lead recovery efforts. 10. Collaboration with IT and Other Departments: - Work with IT to implement technical security controls. - Coordinate with HR to ensure security practices are embedded in onboarding and offboarding processes. - Collaborate with other departments to identify and mitigate security risks. Qualifications & Requirements: - Experience: 3 to 5 years in ISMS implementation and management. - Strong understanding of ISO/IEC 27001 standards and information security frameworks. - Proven ability to conduct risk assessments, manage incidents, and oversee audits. - Experience in business continuity planning and disaster recovery. - Excellent communication and interpersonal skills to collaborate with cross-functional teams. - Strong problem-solving and analytical abilities. - - the candidate must have a very good communication skill.

Posted 2 months ago

Apply

4.0 - 8.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Senior SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This Senior SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Senior SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack Preferred technical and professional experience Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred ExperienceExperience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies