Home
Jobs
Companies
Resume

133 Tenable Jobs

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 years

0 Lacs

Nagaland

On-site

Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. ͏ We are looking for an experienced ServiceNow developer to join our ServiceNow Risk and Security Operations practice as a senior consultant to support client implementation projects. The ideal candidate will have a strong background in ServiceNow implementation projects, with at least one project involving ServiceNow Risk solutions (i.e., Integrated Risk Management, Third Party Risk Management, Business Continuity Management). Our team brings technical expertise, real-world experience, strong executive engagement skills, and an inspirational mindset to help our customers understand the opportunities of the “platform of platforms” vision. We act as Trusted Partners for our customers’ most complex solutions, designed to ensure that they can rapidly realize the value they need. We do this by leveraging best practices and industry standards to build customer trust and architect best-in-class solutions. While collaborating with customers, and the wider ServiceNow Risk and Security Operations delivery team, the right candidate will be able to implement ServiceNow solutions based on requirements and architectural designs approved by the client. The candidate will also lead and participate in the delivery of demonstrations, workshops, best practice overviews, and educational sessions for customers. KEY RESPONSIBILITIES: Gather and document client requirements as part of a ServiceNow implementation project. Configure and test ServiceNow Risk solutions. Be a technical delivery resource, ensuring delivery excellence, aligned to ServiceNow Risk practice expectations. Stay current with new developments in the ServiceNow platform and apply that knowledge to client solutions REQUIRED QUALIFICATIONS: Minimum of 2 years of ServiceNow developer experience. Strong understanding of ServiceNow platform, including experience with custom development, integrations, and workflows. Strong problem-solving and analytical skills. ServiceNow Certified System Administrator certification. Experience working in a consulting environment. PREFERRED QUALIFICATIONS: ServiceNow Certified Implementation Specialist certification in one or more of the following: Risk and Compliance. Third-party Risk Management (TPRM) Implementer. Micro-Certification - Business Continuity Management. ServiceNow Certified Application Developer certifications. Experience in working with an integrated global practice. Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and/or Certified Information Security Manager (CISM) Experience working with industry-leading security operations tools (e.g., CyberXM, Rapid7, Qualys, Tenable, Prisma, Snyk, Veracode, Wiz, Orca, Tanium, Splunk, QRadar. Carbon Black, CrowdStrike, ProofPoint, Cisco, etc). ͏ Mandatory Skills: ServiceNow - GRC. Experience: 8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 day ago

Apply

12.0 years

0 Lacs

Bengaluru

On-site

Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. Job Description Job Summary: Experienced Vulnerability Management and penetration testing Governance lead will manage a team to oversee the identification, assessment, and remediation of security vulnerabilities across enterprise systems. This role will focus on establishing a proactive security posture, ensuring compliance with industry standards, and driving governance initiatives to mitigate risks effectively along with strong leadership and project management skills. Vulnerability Assessment: Lead regular vulnerability scans and penetration testing across infrastructure, cloud environments and outside-In. Security Baseline: Lead development and implementation of Security Baseline using CIS Benchmarks by determining the systems, applications, and network devices to be secured (e.g., Windows, Linux, Cloud, Docker, Kubernetes). Risk Analysis & Prioritization: Evaluate identified vulnerabilities based on severity, exploitability, and potential business impact. Remediation Planning: Collaborate with IT, security, engineering and entity teams to ensure timely remediation of high-risk vulnerabilities. Governance & Compliance: Develop and enforce security governance frameworks in line with industry standards (e.g., NIST, CIS, ISO 27001, PCI-DSS). ͏ Threat Intelligence Integration : Leverage global threat intelligence feeds to stay ahead of emerging security threats and vulnerabilities. Security Policy Development: Define policies and best practices for vulnerability management, reporting, and remediation. Automation & Continuous Monitoring: Implement automated vulnerability scanning tools and ensure ongoing security assessments. Incident Response Support: Provide technical guidance in vulnerability-related security incidents and audits. Reporting & Metrics: Establish key risk indicators and provide executive reports on vulnerability trends and remediation progress. ͏ Experience: 12+ years in cybersecurity, vulnerability management, or Penetration testing roles. Technical Expertise: Hands-on experience with vulnerability scanning tools (e.g., Qualys, Tenable, Rapid7, Nessus, OpenVAS), penetration testing and threat intelligence platforms. Penetration Testing & Ethical Hacking : Experience with tools like Metasploit, Burp Suite, Nmap, and Wireshark for real-world security assessments. Security Framework Knowledge: Strong understanding of NIST, CIS benchmarks, OWASP Top 10, and CVSS scoring models. Compliance Awareness: Familiarity with regulatory standards affecting security risk management. Leadership & Communication: Ability to coordinate with multiple stakeholders, drive security improvements, and articulate risks effectively. Certifications such as CISSP, CISM, CEH, OSCP or equivalent. Experience in cloud vulnerability management (AWS, Azure, GCP). Knowledge of DevSecOps practices and security automation. ͏ ͏ Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 day ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Description Some careers shine brighter than others. If you’re looking for a career that will help you stand out, join HSBC and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. HSBC is one of the largest banking and financial services organisations in the world, with operations in 64 countries and territories. We aim to be where the growth is, enabling businesses to thrive and economies to prosper, and, ultimately, helping people to fulfil their hopes and realise their ambitions. We are currently seeking an experienced professional to join our team in the role of Consultant Specialist In this role, you will: Serve as Security Engineer supporting technical operations for critical cybersecurity technologies. Provide end to end administration and production support for cybersecurity tools under Endpoint security, Data Security, Network security, Application Security and SIEM/SOAR. Analyze, investigate, remediate cybersecurity application incidents in operational/production environment. Automate repeated and operational tasks through programming (Perl, Python, PHP, Bash, or PowerShell) or other interfaces. Setup monitoring and event management for cyber security products to help manage availability, reliability, and performance. Perform cybersecurity application installation, upgrades, product hygiene and maintenance. Operate in accordance with ITIL processes such as Change Management process, Incident Management and Problem Management Lead product support transitions on both technical and process front. Identify operational gaps and drive continual service improvement plans for existing processes. Build tool knowledgebase and establish/enhance Standard Operation Procedures (SOP) Work with minimal supervision and conduct activities as a collaborative partner to Cyber Security as well as other lines of business (LOBs) Develop and produce operational metrics such as Change success rate, tool uptime report, Incident ticket volume etc. The role demands weekend support on rotation Requirements To be successful in this role, you should meet the following requirements: Relevant experience in tool administration and support of at least 2 + tools in one or more areas is MUST Endpoint security (CrowdStrike or any EDR solution) Network security (ISE/NAC solutions, Network segmentation, Web proxy solutions) Application security (Nessus/Tenable, Container/Docker security.) Data Security (Industry leading DLP technology such as Symantec DLP) SIEM/SOAR (Splunk ES, Splunk SOAR) Familiarity with Unix & Windows operating system is a MUST. Experience working on Amazon web services (Compute, Storage and Networking) is nice to have. Experience with any one of the script languages such as Perl/PowerShell/Python is desired. Must possess clear oral and written communication skills and be able to clearly articulate complex concepts to broader audience. Excellent analytical and problem-solving skills – ability to get to the root of the problem, assess impact, and develop a resolution plan quickly, leveraging all available resources, is essential. Must take ownership of tasks and demonstrate high degree of responsibility to ensure completion You’ll achieve more when you join HSBC. www.hsbc.com/careers HSBC is committed to building a culture where all employees are valued, respected and opinions count. We take pride in providing a workplace that fosters continuous professional development, flexible working and opportunities to grow within an inclusive and diverse environment. Personal data held by the Bank relating to employment applications will be used in accordance with our Privacy Statement, which is available on our website. Issued by – HSBC Software Development India Show more Show less

Posted 2 days ago

Apply

3.0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Linkedin logo

About Us: Barry-Wehmiller is a diversified global supplier of engineering consulting and manufacturing technology for the packaging, corrugating, sheeting and paper-converting industries. By blending people-centric leadership with disciplined operational strategies and purpose-driven growth, Barry-Wehmiller has become a $3 billion organization with nearly 12,000 team members united by a common belief: to use the power of business to build a better world. Job Description: About Barry Wehmiller: - Barry Wehmiller Companies is a global supplier of manufacturing technology and services based in St. Louis Missouri. Although it was founded in 1885 as a maker of machinery for the brewing industry, since 1987 Barry-Wehmiller has acquired more than 80 companies that provide equipment and services for a variety of industries: packaging, paper converting, sheeting, corrugating, engineering, and IT consulting. In 2016 it was ranked no. 10 on the St. Louis Business Journal's list of the city's Top 150 Privately Held Companies. We believe our culture differentiates us from other firms. In India, Barry-Wehmiller operates as a hub of innovation and collaboration, housing our Global Competency Center (GCC) and other strategic functions. The GCC, based in Chennai, is an Engineering Center of Excellence that supports all Barry-Wehmiller divisions globally. The center focuses on areas such as design and development in mechanical, electrical, and controls engineering, software development, and additive manufacturing. We believe in: Ownership – You’ll drive features end-to-end, from design to deployment. Flexibility – A friendly, results-oriented culture that respects your time. Empowerment – Your insights are valued, and your work makes a visible difference. Learning & Growth – You’ll work on complex challenges with smart, passionate peers—and have the support to level up continually. If you’re ready to bring your best thinking to the table and grow in a high-impact, future-focused environment, we’d love to hear from you. Job Description: The Enterprise IT Service Desk Workstation Vulnerability Analyst’s role is to help secure the company’s workstations against vulnerabilities. This will be done through analyzing scan data, researching vulnerabilities, and providing mitigation for said vulnerabilities within SLA timelines. Additionally, deployment of mitigations may be required. The Workstation Vulnerability Analyst will also need to present findings to IT leadership. Job Specifications: Proven analytical and problem-solving abilities. Ability to effectively prioritize and execute tasks in a fast-paced environment. Ability to shift between tasks as priorities change Strong written and oral communication skills. Strong troubleshooting skills and knowledge of IT hardware and software. Ability to conduct research into software issues and products as required. Strong organizational skills with keen attention to detail. Basic understanding of security principles, protocols, and technologies. Familiarity with vulnerability assessment tools (e.g., Nessus/Tenable, Qualys, OpenVAS) is a plus. Principal Duties and Responsibilities (Essential Functions): Analyze the results of vulnerability scans Understand business criticality of various systems Prioritize work based on risk Complete work within deadlines Assist in identifying and assessing vulnerabilities in the organization's systems, networks, and applications. Support the development and implementation of remediation plans to address identified vulnerabilities. Participate in regular vulnerability assessments and penetration tests to identify new security risks. Monitor security alerts and incidents and assist in determining the impact and necessary response. Assist with rollback if necessary Document and report on remediation activities, including progress and outcomes. Investigate and remediate malfunctioning security agents Function and communicate in a global support team. Analyze root cause and implement corrective solutions. Collaborate with IT, security, and development teams to ensure timely and effective remediation. When necessary, contact third-party software and PC equipment vendors. Maintain knowledge of current IT trends and advancements. Stay informed about the latest security threats, vulnerabilities, and mitigation techniques. Provide support to other teams on vulnerability management best practices. Required Education and Experience: An associate degree in the field of computer science or management information systems, and/or 3-5 years of related work experience is preferred. 3-5 years of vulnerability remediation preferred; experience with patch management and scripting is a plus. Experience working in a team-oriented, collaborative environment. Relevant certifications (e.g., CompTIA Security+, CEH) are a plus but not required. Travel: Travel could be up to 15% (in the country) as needed for remote support. What is it for you? This role is more than just a job. It’s an opportunity to be part of a global team that values people excellence, innovative solutions, and operational excellence. Barry-Wehmiller provides a unique environment where you can grow your skills, work on impactful projects, and collaborate with some of the brightest minds in the industry. In addition, we are deeply committed to your personal and professional growth, fostering a culture that helps you achieve your full potential. To understand more about our people-first philosophy, you may like to watch this short video by our CEO, Mr. Bob Chapman , on Truly Human Leadership : Watch the video At Barry-Wehmiller we recognize that people come with a wealth of experience and talent beyond just the technical requirements of a job. If your experience is close to what you see listed here, please still consider applying. We know that our differences often can bring about innovation, excellence and meaningful work—therefore, people from all backgrounds are encouraged to apply to our positions. Please let us know if you require reasonable accommodations during the interview process. Company: BW Corporate US Show more Show less

Posted 2 days ago

Apply

0 years

0 Lacs

Bengaluru

On-site

Bangalore,Karnataka,India Job ID 768426 Join our Team About the Role: We are hiring a Vulnerability Engineer to join our Managed Security Services team. You will be responsible for identifying, analyzing, and tracking security vulnerabilities across enterprise environments. The role involves working with scanning tools, coordinating with stakeholders, and ensuring timely remediation to minimize security risk. Key Responsibilities: Perform vulnerability scans using tools like Tenable Nessus, Qualys, IBM AppScan , etc. Analyze scan results, identify false positives, and prioritize risks Track and support remediation efforts with technical teams Register and manage assets in scanning platforms and maintain scan schedules Prepare reports and metrics for leadership and stakeholders Coordinate with customers on scan schedules and mitigation plans Contribute to automation and process optimization Required Skills: Strong knowledge of vulnerability management processes and tools like Tenable Nessus, Qualys, IBM AppScan etc Solid understanding of network, system, and application-level security Experience in report writing and communicating technical findings Familiarity with enterprise IT environments and TCP/IP networking Excellent problem-solving, collaboration, and communication skills Willingness to participate in on-call support rotation Preferred: Experience with scripting/automation for scanning and reporting Security certifications (e.g., CEH, CompTIA Security+, OSCP) Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply?

Posted 2 days ago

Apply

7.0 years

0 Lacs

Pune, Maharashtra, India

Remote

Linkedin logo

This job is with Allianz Commercial, an inclusive employer and a member of myGwork – the largest global platform for the LGBTQ+ business community. Please do not contact the recruiter directly. The Vulnerability Management Engineer is responsible for managing the identification, assessment, reporting, and mitigation of infrastructure and cloud vulnerabilities. A candidate for this role will have a mindset of a defender and be able to operate in a fast-paced environment working closely with our infrastructure team that includes Network, Firewall, Hypervisors, Servers, and business application teams. Primary Skills At least 7+ years' experience in Information Security or Information Technology field. Bachelor's degree in computer science, Information Security, or equivalent combined experience. Hands-on experience with a variety of vulnerability management and network scanning tools, such as Qualys, Tenable Security Center, Nmap, web scanners, etc. Understanding of the relationship between operating systems, applications, and their dependencies, and how interrelated software vulnerabilities exist - with ability to determine remediation techniques in diverse environments. Conduct regular vulnerability scans and assessments on network devices, servers, applications, and databases. Perform vulnerability metrics reporting for ad-hoc and scheduled metrics report for various KPIs (Key Performance Indicators) around vulnerability management activities. Knowledge of both Windows and UNIX-based operating systems (e.g. Windows Server and Client OS, RHEL, Ubuntu, Amazon Linux, MacOS), and container technologies (e.g. Kubernetes, Docker). Ability to script and program using Python and other scripting and programming languages (i.e. SQL, Python, C, Java, JavaScript), notably for working with RESTful APIs. Perform regular security audits and compliance checks to ensure adherence to security policies and standards. Experience working with REST APIs and integrating API frameworks into wider business intelligence solutions. Ability to analyse vulnerabilities to appropriately characterize threats and provide remediation advice. Familiarity with classes of vulnerabilities, appropriate remediation, and industry-standard classification schemes (CVE, CVSS, CPE). Capable of independently managing customer requirements, from the initial information gathering phase through to implementation. Secondary Skill Knowledge of the DORA Standard. Solid experience in offensive security, adversarial tactics, techniques, and procedures (e.g. using MITRE ATT&CK framework), and common attack patterns such as binary exploitation, memory corruption, race conditions, web attacks, etc. In-depth knowledge of security standard methodologies, technologies and products and aim to continuously improve these skills. Knowledge of CI/CD pipelines, GitHub or other version control systems, and cloud hosting environment's (i.e. AWS) applicable security standard methodologies. Experience working in agile project management toolsets, creating tickets which break down work into manageable pieces, tracking capacity, and closing stories in a timely manner, and documenting work (i.e. Jira, Confluence, ServiceNow). Soft Skill Good experience working with numerous external teams to track and deliver solutions. Strong detail-oriented individual able to efficiently analyze and resolve problems. Strong verbal, communication, and diplomacy skills with all levels of the business. Must be self-motivated, able to work independently, and multi-task effectively. Skills Desired Exposure or knowledge of cloud architectures, services, and vulnerabilities. Understanding of risk assessment methodologies. Proficiency in using vulnerability scanning tools such as Qualys etc. Qualys, MDE & C, SNS, Excellent in Excel. Ability to interpret vulnerability data from multiple sources. Reporting and metrics expertise with platforms such as Splunk, PowerBI, etc Your Benefits We offer a hybrid work model which recognizes the value of striking a balance between in-person collaboration and remote working incl. up to 25 days per year working from abroad We believe in rewarding performance and our compensation and benefits package includes a company bonus scheme, pension, employee shares program and multiple employee discounts (details vary by location From career development and digital learning programs to international career mobility, we offer lifelong learning for our employees worldwide and an environment where innovation, delivery and empowerment are fostered Flexible working, health and wellbeing offers (including healthcare and parental leave benefits) support to balance family and career and help our people return from career breaks with experience that nothing else can teachAbout Allianz Technology Allianz Technology is the global IT service provider for Allianz and delivers IT solutions that drive the digitalization of the Group. With more than 13,000 employees located in 22 countries around the globe, Allianz Technology works together with other Allianz entities in pioneering the digitalization of the financial services industry.We oversee the full digitalization spectrum - from one of the industry's largest IT infrastructure projects that includes data centers, networking and security, to application platforms that span from workplace services to digital interaction. In short, we deliver full-scale, end-to-end IT solutions for Allianz in the digital age. D&I statement Allianz Technology is proud to be an equal opportunity employer encouraging diversity in the working environment. We are interested in your strengths and experience. We welcome all applications from all people regardless of gender identity and/or expression, sexual orientation, race or ethnicity, age, nationality, religion, disability, or philosophy of life Join us. Let´s care for tomorrow You. IT Show more Show less

Posted 3 days ago

Apply

7.0 years

0 Lacs

Greater Kolkata Area

On-site

Linkedin logo

Position Summary Job title: IoT/OT Cybersecurity - Sr. Consultant About At Deloitte, we do not offer you just a job, but a career in the highly sought-after risk Management field. We are one of the business leaders in the risk market. We work with a vision to make the world more prosperous, trustworthy, and safe. Deloitte’s clients, primarily based outside of India, are large, complex organizations that constantly evolve and innovate to build better products and services. In the process, they encounter various risks and the work we do to help them address these risks is increasingly important to their success—and to the strength of the economy and public security. By joining us, you will get to work with diverse teams of professionals who design, manage, and implement risk-centric solutions across a variety of domains. In the process, you will gain exposure to the risk-centric challenges faced in today’s world by organizations across a range of industry sectors and become subject matter experts in those areas. Our Risk and Financial Advisory services professionals help organizations effectively navigate business risks and opportunities—from strategic, reputation, and financial risks to operational, cyber, and regulatory risks—to gain competitive advantage. We apply our experience in ongoing business operations and corporate lifecycle events to help clients become stronger and more resilient. Our market-leading teams help clients embrace complexity to accelerate performance, disrupt through innovation, and lead in their industries. We use cutting-edge technology like AI/ML techniques, analytics, and RPA to solve Deloitte’s clients ‘most complex issues. Working in Risk and Financial Advisory at Deloitte US-India offices has the power to redefine your ambitions. The Team Cyber & Strategic Risk We help organizations create a cyber-minded culture, reimagine risk to uncover strategic opportunities, and become faster, more innovative, and more resilient in the face of ever-changing threats. We provide intelligence and acuity that dynamically reframes risk, transcending a manual, reactive paradigm. The cyber risk services—Identity & access management (IAM) practice helps organizations in designing, developing, and implementing industry-leading IAM solutions to protect their information and confidential data, as well as help them build their businesses and supporting technologies to be more secure, vigilant, and resilient. The IAM team delivers service to clients through following key areas: User provisioning Access certification Access management and federation Entitlements management Work you’ll do Roles & Responsibilities: Cybersecurity Strategy Development Develop and implement comprehensive cybersecurity strategies tailored for IoT and OT environments to safeguard critical infrastructure and data. This involves understanding the specific security needs of various IoT and OT systems and creating bespoke strategies to address them. Risk Assessment Conduct security risk assessments and vulnerability analyses on IoT and OT systems, identifying potential threats and proposing mitigation strategies. This includes regular audits and compliance checks to ensure security measures are up-to-date. Solution Implementation Design, deploy, and manage IoT and OT cybersecurity solutions, ensuring robust protection against cyber threats. This requires hands-on experience with IoT and OT security technologies, as well as the ability to customize and integrate these solutions into existing infrastructures. Compliance and Standards Ensure adherence to relevant industry standards, regulations, and best practices (e.g., NIST, ISO/IEC 27001, IEC 62443). This involves staying informed about changes in regulatory requirements and adjusting strategies accordingly. Incident Response: Develop and implement incident response plans for IoT and OT environments, including detection, analysis, containment, eradication, and recovery. This also involves conducting regular drills and simulations to ensure preparedness. Training and Awareness Conduct cybersecurity training and awareness programs for staff, promoting best practices and ensuring a security-conscious culture. Creating educational materials and leading workshops or seminars. Stakeholder Collaboration Work closely with cross-functional teams, including IT, engineering, and operations, to integrate cybersecurity measures into IoT and OT projects. Excellent communication and collaboration skills to ensure all stakeholders are aligned. Continuous Improvement Stay updated with the latest trends, technologies, and threat landscapes in IoT and OT cybersecurity, continuously enhancing security measures. Participating in industry conferences, webinars, and other professional development opportunities. Required Skills Understanding of: IoT and OT protocols: OPC UA, Modbus, Profibus, Profinet, DNP3, MQTT, Zigbee etc. Industrial Network Architectures: ZTNA, Purdue Model, Software Defined Network Segmentation Experience in deployment or operations of at-least one of the following solutions: OT Security Monitoring: Clority, Nozomi, Defender for IoT, Cisco Cyber Vision, Dragos, Palo Alto IoT Security, Tenable. OT etc. Knowledge of regulatory and compliance frameworks such as ISA/IEC 62443, NIST 800-82, NOG 104 Strong networking experience with understanding of switches, routers configuration. Proficiency in cybersecurity tools and platforms such as SIEM, IDS/IPS, firewalls, and vulnerability management solutions. Qualification Bachelor's or Master's degree in Computer Science, Information Security, or a related field. Preferred specialization in Cyber Physical Systems (CPS) or IoT Security 7+ years of experience in cybersecurity, with a focus on IoT and OT environments. Proven track record of successfully securing IoT and OT systems for large organizations. Relevant certifications such as CISSP, CISM, CEH, or equivalent. Great to have IoT/OT certifications such as GICSP, GRIP or ISA 62443 Great to have networking certifications such as CCNA, CCNP etc. How You’ll Grow At Deloitte, we’ve invested a great deal to create a rich environment in which our professionals can grow. We want all our people to develop in their own way, playing to their own strengths as they hone their leadership skills. And, as a part of our efforts, we provide our professionals with a variety of learning and networking opportunities—including exposure to leaders, sponsors, coaches, and challenging assignments—to help accelerate their careers along the way. No two people learn in the same way. So, we provide a range of resources including live classrooms, team-based learning, and eLearning. DU: The Leadership Center in India, our state-of-the-art, world-class learning Center in the Hyderabad offices is an extension of the Deloitte University (DU) in Westlake, Texas, and represents a tangible symbol of our commitment to our people’s growth and development. Explore DU: The Leadership Center in India . Deloitte’s culture Our positive and supportive culture encourages our people to do their best work every day. We celebrate individuals by recognizing their uniqueness and offering them the flexibility to make daily choices that can help them to be healthy, centered, confident, and aware. Deloitte is committed to achieving diversity within its workforce, and encourages all qualified applicants to apply, irrespective of gender, age, sexual orientation, disability, culture, religious and ethnic background. We offer well-being programs and are continuously looking for new ways to maintain a culture that is inclusive, invites authenticity, leverages our diversity, and where our people excel and lead healthy, happy lives. Learn more about Life at Deloitte. Corporate citizenship Deloitte is led by a purpose: to make an impact that matters. This purpose defines who we are and extends to relationships with Deloitte’s clients, our people and our communities. We believe that business has the power to inspire and transform. We focus on education, giving, skill-based volunteerism, and leadership to help drive positive social impact in our communities. Learn more about Deloitte’s impact on the world. Recruiting tips Finding the right job and preparing for the recruitment process can be tricky. Check out tips from our Deloitte recruiting professionals to set yourself up for success. Check out recruiting tips from Deloitte recruiters . Benefits We believe that to be an undisputed leader in professional services, we should equip you with the resources that can make a positive impact on your well-being journey. Our vision is to create a leadership culture focused on the development and well-being of our people. Here are some of our benefits and programs to support you and your family’s well-being needs. Eligibility requirements may be based on role, tenure, type of employment and/ or other criteria. Learn more about what working at Deloitte can mean for you . Our people and culture Our people and our culture make Deloitte a place where leaders thrive. Get an inside look at the rich diversity of background, education, and experiences of our people. What impact will you make? Check out our professionals’ career journeys and be inspired by their stories. Professional development You want to make an impact. And we want you to make it. We can help you do that by providing you the culture, training, resources, and opportunities to help you grow and succeed as a professional. Learn more about our commitment to developing our people . © 2024. See Terms of Use for more information. Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ("DTTL"), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as "Deloitte Global") does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the "Deloitte" name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about our global network of member firms. Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Benefits At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Professional development From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career. Requisition code: 300471 Show more Show less

Posted 3 days ago

Apply

0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Optum is a global organization that delivers care, aided by technology to help millions of people live healthier lives. The work you do with our team will directly improve health outcomes by connecting people with the care, pharmacy benefits, data and resources they need to feel their best. Here, you will find a culture guided by inclusion, talented peers, comprehensive benefits and career development opportunities. Come make an impact on the communities we serve as you help us advance health optimization on a global scale. Join us to start Caring. Connecting. Growing together. This Senior Information Security Engineer is a member of the UHC A&I Tech Infra, Cloud and Data Services team that supports US Health Group and Student Resources,. This engineer will work with 4000+ agents as level 2 support for security incidents and investigation. Their primary function will be to monitor and respond to all vulnerabilities in Tanium, Tenable, and Security Platform. In addition the engineer will have primary responsibility of all updates throughout the infrastructure for the UHC lines of business that ingests over 200,000 MB of logs for Windows and RHEL Servers. This engineer will also work in Service Now to monitor queues and work incidents to resolution. This engineer will be working in both on-premise and azure cloud monitoring security and compliance. This engineer will work throughout the organization to quickly remediate any daily findings of new vulnerabilities that arise and create daily reports to show updated findings and tasks for remediation. Primary Responsibilities Core Tasks: Microsoft Server patching & management ,TVM remediate all vulnerabilities, patching Maintain cadence of monthly patching schedule for updates to all environments Operate and maintain security systems to protect data and systems and ensure auditability and compliance Respond, analyze, and resolve outages, incidents and/or threats Fulfill service requests Deploy new, update existing, replace or decommission solutions Work in Microsoft Endpoint Configuration Manager (MECM) for patching and Vulnerability remediation Comply with the terms and conditions of the employment contract, company policies and procedures, and any and all directives (such as, but not limited to, transfer and/or re-assignment to different work locations, change in teams and/or work shifts, policies in regards to flexibility of work benefits and/or work environment, alternative work arrangements, and other decisions that may arise due to the changing business environment). The Company may adopt, vary or rescind these policies and directives in its absolute discretion and without any limitation (implied or otherwise) on its ability to do so Required Qualification Full time graduate Core Tasks: Microsoft Server patching & management ,TVM remediate all vulnerabilities, patching Maintain cadence of monthly patching schedule for updates to all environments Operate and maintain security systems to protect data and systems and ensure auditability and compliance Respond, analyze, and resolve outages, incidents and/or threats Fulfill service requests Deploy new, update existing, replace or decommission solutions Work in Microsoft Endpoint Configuration Manager (MECM) for patching and Vulnerability remediation Comply with the terms and conditions of the employment contract, company policies and procedures, and any and all directives (such as, but not limited to, transfer and/or re-assignment to different work locations, change in teams and/or work shifts, policies in regards to flexibility of work benefits and/or work environment, alternative work arrangements, and other decisions that may arise due to the changing business environment). The Company may adopt, vary or rescind these policies and directives in its absolute discretion and without any limitation (implied or otherwise) on its ability to do so At UnitedHealth Group, our mission is to help people live healthier lives and make the health system work better for everyone. We believe everyone-of every race, gender, sexuality, age, location and income-deserves the opportunity to live their healthiest life. Today, however, there are still far too many barriers to good health which are disproportionately experienced by people of color, historically marginalized groups and those with lower incomes. We are committed to mitigating our impact on the environment and enabling and delivering equitable care that addresses health disparities and improves health outcomes — an enterprise priority reflected in our mission. #Nic #Nic Show more Show less

Posted 4 days ago

Apply

5.0 - 7.0 years

0 Lacs

Kolkata, West Bengal

On-site

Indeed logo

Relevant Experience: 5-7 Years on SOC Operation Education: BE/BTECH/MCA/BCA/MSC/BSC in Computer Science Certification: CISA/CISSP/CISM/Any OEM Certification in the field of IT Security Skills – Security Tools : Ø ArcSight (SIEM) Ø DLP Ø WAF Ø DAM Ø NBA Ø PIM Ø AlgoSec Ø Anti Malware Ø Cisco HCI Ø Tenable Job Types: Full-time, Permanent Pay: ₹800,000.00 - ₹1,400,000.00 per year Benefits: Health insurance Schedule: Rotational shift Application Question(s): What is your notice period? What is your current CTC? What is your total relevant experience? Location: Kolkata, West Bengal (Required) Work Location: In person

Posted 4 days ago

Apply

0.0 years

0 Lacs

Bengaluru, Karnataka

On-site

Indeed logo

Bangalore,Karnataka,India Job ID 768426 Join our Team About the Role: We are hiring a Vulnerability Engineer to join our Managed Security Services team. You will be responsible for identifying, analyzing, and tracking security vulnerabilities across enterprise environments. The role involves working with scanning tools, coordinating with stakeholders, and ensuring timely remediation to minimize security risk. Key Responsibilities: Perform vulnerability scans using tools like Tenable Nessus, Qualys, IBM AppScan , etc. Analyze scan results, identify false positives, and prioritize risks Track and support remediation efforts with technical teams Register and manage assets in scanning platforms and maintain scan schedules Prepare reports and metrics for leadership and stakeholders Coordinate with customers on scan schedules and mitigation plans Contribute to automation and process optimization Required Skills: Strong knowledge of vulnerability management processes and tools like Tenable Nessus, Qualys, IBM AppScan etc Solid understanding of network, system, and application-level security Experience in report writing and communicating technical findings Familiarity with enterprise IT environments and TCP/IP networking Excellent problem-solving, collaboration, and communication skills Willingness to participate in on-call support rotation Preferred: Experience with scripting/automation for scanning and reporting Security certifications (e.g., CEH, CompTIA Security+, OSCP) Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply?

Posted 4 days ago

Apply

5.0 - 10.0 years

13 - 16 Lacs

Pune

Work from Office

Naukri logo

Project description Security is a global organization within Group Technology Infrastructure and Security Engineering. Our services focus on preventing and detecting cyber threats and securing our IT systems. We provide consolidated and reliable security services that implement secure design principles and create best-fit solutions. You will be working in the Cyber Technology service team, providing security products and services for the Cyber Hygiene space - specifically for Infrastructure Scanning and vulnerability assessment. We provide consolidated and reliable security hygiene controls to our clients using the latest technology. As a Cyber Security Engineer, you will play a vital role in creating Infrastructure Scanning and Security Remediation capabilities, determining required IT business solutions, and assisting in implementing them. We offer flexibility in the workplace and equal opportunities to all our team members. Responsibilities Perform vulnerability scanning to discover and analyze vulnerabilities and characterize risks to networks, OS, application, databases etc. (to meet scan coverage targets) Stakeholder engagement to recommend appropriate remedial actions to mitigate risks and validate remedial actions and ensure compliance with regulatory requirements. Perform vulnerability management system administration functions, as required Maintain proficiency in vulnerability management best practices Onboarding new attack surface to vulnerability scanning process Documentation management and continuous service improvement Skills Must have - 5-10 years relevant experience Degree in related discipline or qualified by experience Well-developed oral and written English communication skills Team player with ability to work collaboratively with others and aptitude for self-development Experience using commercial vulnerability scanning solutions such as Rapid7, Qualys, Tenable etc. Expertise with administration of networks, windows and or Linux operating systems An understanding of IT Security Risk, attack vector Nice to have N/A Other Languages EnglishC1 Advanced Seniority Regular

Posted 4 days ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

SystemsPlus is hiring for System Engineer, Exp : 5yr + Immiedate joiners only. Location : Pune, Hybrid. SUMMARY OF ESSENTIAL JOB FUNCTIONS: Deliver patch management services to clients as part of a broader managed service offering. Maintain and enhance automation tools for assessing and deploying security patches to Windows, Linux, Mac, and third-party applications. Monitor patch deployment dashboards, identify issues, and ensure successful remediation. Develop and maintain patch schedules in line with customer service level agreements and maintenance windows. Perform patch impact analysis, testing, and change control procedures in pre-production environments. Generate and analyze compliance and vulnerability reports and provide actionable insights. Collaborate with security, compliance, and service desk teams to ensure coordinated response to vulnerabilities. Create and maintain up-to-date documentation, runbooks, and client communication templates. Respond to patch-related incidents and requests in a timely manner. Continuously improve patching processes through scripting and tool integration. REQUIRED SKILLS AND EXPERIENCE: 5+ years of experience in IT infrastructure, systems administration, or managed services. Strong understanding of patch management processes and tools (e.g., Microsoft MECM, WSUS, Intune, Datto (RMM), Patch my PC, Automox, Ansible, Jamf Pro). Familiarity with enterprise OS environments: Windows Server/Desktop, Linux (RHEL, Ubuntu), and MacOS. Experience with scripting languages such as PowerShell, Bash, or Python. Strong troubleshooting skills and familiarity with vulnerability management and compliance frameworks. Excellent communication and documentation skills. Experience in a managed services provider (MSP) or service delivery role. Knowledge of ITIL and service management practices. Exposure to vulnerability scanning tools (e.g., Tenable, Qualys, Rapid7). Experience with automation. Interested candidates drop CV on khyati.sagar@systems-plus.com Show more Show less

Posted 4 days ago

Apply

5.0 years

0 Lacs

Thiruvananthapuram, Kerala, India

On-site

Linkedin logo

Job Description Qualifications Required . Bachelor’s or Master’s degree in Computer Science, Information Technology, Cybersecurity, or a related field. Equivalent professional experience is acceptable. Minimum 5+ years of experience in Azure cloud operations, with a demonstrated focus on security and vulnerability management. Proven track record of managing and securing large-scale Azure environments in production. Hands-on experience with vulnerability scanning, remediation, and compliance in enterprise cloud environments. Extensive experience in responding to and managing security incidents and threat mitigation in Azure. Technical Skills Azure Expertise : In-depth knowledge of Azure services, including but not limited to: Azure Security Center Azure Defender Azure Key Vault Azure Policy Azure Sentinel (SIEM) Azure Active Directory (Azure AD) Security and Vulnerability Tools : Proficiency with vulnerability scanning and management tools like Qualys, Tenable Nessus, or Rapid7. Experience with Azure-native security tools for threat detection and remediation. Infrastructure Hardening : Strong knowledge of security best practices for securing virtual machines, storage accounts, AKS, and network components. Familiarity with zero-trust architecture principles and implementation in Azure. Automation & Scripting : Advanced skills in scripting languages such as PowerShell , Azure CLI , Python , or other automation tools to remediate vulnerabilities and improve operational efficiency. Experience in integrating security checks into CI/CD pipelines. Certifications (Preferred or Mandatory) Azure Cloud Certifications: Microsoft Certified: Azure Administrator Associate (AZ-104) Microsoft Certified: Azure Security Engineer Associate (AZ-500) Microsoft Certified: Cybersecurity Architect Expert (SC-100) Security Certifications: Certified Information Systems Security Professional ( CISSP ) Certified Ethical Hacker ( CEH ) CompTIA Security+ GIAC certifications (e.g., GCIH, GSEC, or GCED) Other Requirements Familiarity with regulatory and compliance standards, such as ISO 27001 , SOC 2 , GDPR , or HIPAA . Experience in performing and supporting audits related to cloud security. Proven ability to stay current with evolving cloud and cybersecurity trends. Show more Show less

Posted 4 days ago

Apply

5.0 - 7.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Job Title: L3 SOC Lead Location: Kolkata Job Description We are urgently looking for an experienced L3 SOC Lead to join the Security Operations Center (SOC) team at UCO Bank. The ideal candidate will have extensive experience in SOC operations and security management tools, and will be responsible for leading the SOC team to monitor, detect, analyze, and respond to cybersecurity threats and incidents effectively. Key Responsibilities Lead and manage the SOC team for continuous monitoring, detection, and response of security incidents. Oversee SOC operations to ensure timely and effective incident management. Perform advanced analysis and investigation of security events and incidents. Develop and implement SOC processes, procedures, and escalation mechanisms. Collaborate with cross-functional teams for threat intelligence sharing and incident remediation. Manage and optimize security tools including SIEM, DLP, WAF, DAM, and others. Conduct periodic security assessments and audits to ensure compliance. Provide technical guidance and mentorship to SOC analysts. Prepare reports and communicate SOC metrics, incident trends, and risk posture to management. Required Skills and Expertise Strong hands-on experience with the following Security Tools: ArcSight (SIEM) Data Loss Prevention (DLP) Web Application Firewall (WAF) Database Activity Monitoring (DAM) Network Behavior Analysis (NBA) Privileged Identity Management (PIM) AlgoSec (Security Policy Management) Anti-Malware Solutions Cisco HyperFlex Infrastructure (HCI) Tenable (Vulnerability Management) Expertise in analyzing and responding to cybersecurity threats and incidents. In-depth knowledge of security frameworks, threat intelligence, and incident response. Proven experience in leading SOC operations and teams. Strong understanding of networking, system security, and endpoint protection. Education & Certifications Bachelor’s or Master’s degree in Computer Science or related field (BE/B.Tech/MCA/BCA/MSc/BSc). Relevant professional certifications (mandatory): CISA / CISSP / CISM or Any OEM certification in IT Security (e.g., Certified Ethical Hacker, GIAC, etc.) Experience 5-7 years of relevant experience in SOC operations. Prior experience leading a SOC or security team will be preferred. Show more Show less

Posted 4 days ago

Apply

5.0 years

0 Lacs

India

Remote

Linkedin logo

Job Title: Technical Support Specialist Experience Level: 5+ Years Location: Remote Department: Infrastructure & Technical Services Job Summary: We are seeking a skilled and proactive specialist in who can provide Network Support, Windows Desktop Support, Microsoft 365 Infrastructure Support, and Server Administration Support to join our Infrastructure & Technical Services team. The ideal candidate will have over five years of hands-on experience in said mentioned support areas. This role is critical in maintaining the stability, security, and performance of our customers infrastructure. The candidate must also be bilingual in Spanish and English , with the ability to translate technical terms between the two languages. Key Responsibilities: Monitor, troubleshoot, and support enterprise network infrastructure including LAN/WAN, firewalls, and switches. Support and maintain Palo Alto firewalls, including security policies, NAT, and VPNs. Administer and support Cisco switches, VLANs, and spanning tree protocols. Collaborate with cross-functional teams to support infrastructure projects and deployments. Maintain network documentation, diagrams, and standard operating procedures. Provide support for Windows desktop environments, including installation, configuration, and maintenance. Troubleshoot and resolve hardware, software, and network issues for end users. Manage and support mobile devices (iOS and Android) using Mobile Device Management (MDM) solutions. Administer and maintain IT service management tools such as ManageEngine. Support and configure Windows, Apple iOS and Android devices in a corporate environment. Provide support for Microsoft 365 services including Exchange Online, Teams, SharePoint, OneDrive, and Intune. Manage user identity and access through Azure Active Directory, including conditional access policies and MFA. Monitor M365 service health, investigate incidents, and resolve issues using Microsoft 365 Admin Center and PowerShell. Support hybrid environments integrating on-premises Active Directory with Azure AD. Collaborate with security teams to enforce compliance, data loss prevention (DLP), and threat protection policies. Assist in tenant-level configuration, license management, and service adoption strategies. Administer, monitor, and troubleshoot Windows Server (2012–2022) and Linux environments. Knowledge virtualization infrastructure using VMware vSphere/ESXi. Knowledge in Deploy, configure, and maintain cloud services in Microsoft Azure . Understanding security tools such as Tenable Nessus, Cortex XDR, and ManageEngine solutions. Knowledge in Automate system administration tasks using Ansible and scripting (PowerShell, Bash). Working with teams on regular system updates, patch management, and vulnerability remediation. Ensure compliance with company security policies and industry best practices. Participate in on-call rotation and provide after-hours support as needed. A MUST / Translate technical documents and communications from Spanish to English and vice versa. A MUST / Communicate effectively with Spanish-speaking and English-speaking stakeholders. Required Qualifications: Minimum 5 years of experience in network support or administration. Knowledge with Palo Alto firewalls and Cisco switches Proficiency in Cisco switching technologies and basic routing protocols. Good understanding of TCP/IP, DNS, DHCP, VPN, and network segmentation along with identity federation (e.g., ADFS, SSO). Experience with network monitoring and diagnostic tools (e.g., Wireshark, SolarWinds). Proficiency in Windows OS (Windows 10/11) and Microsoft Office Suite. Experience with ManageEngine or similar ITSM tools. Experience with MDM platforms (e.g., Intune, ManageEngine MDM, MobileIron, AirWatch). Knowledge of iPhone and Android device configuration and support. Familiarity with Apple iOS and macOS environments. Proficiency in PowerShell scripting for automation and administration tasks. Experience with Microsoft Endpoint Manager (Intune), Exchange Online Protection (EOP), and Defender for Office 365. Excellent problem-solving and communication skills. A MUST / Fluent in both Spanish and English, with the ability to translate technical terms between the two languages. Preferred Qualifications: - Experience with cloud networking (AWS, Azure) is a plus. - Familiarity with ITIL practices and ticketing systems. Show more Show less

Posted 4 days ago

Apply

10.0 years

0 Lacs

India

Remote

Linkedin logo

Now Hiring: Senior Cyber Security Engineers Location: Bangalore (Preferred) | Open to Remote Candidates Across India Engagement Type: 8–12 Months Contract OR Full-Time (Direct Hire) Salary: Open – Based on Experience (DoE) Are you a seasoned Cyber Security Engineer with a strong track record in cloud security, vulnerability management, DLP, and IAM ? We are hiring for immediate openings to support a key project for a top-tier enterprise client. This is a high-impact role for professionals who bring both strategic insight and hands-on expertise to secure cloud environments, protect critical data, and manage access controls. Key Responsibilities: Implement and manage end-to-end cloud security across AWS, Azure, or GCP environments Conduct vulnerability assessments , analyze threat reports, and drive mitigation strategies Design and enforce Data Loss Prevention (DLP) policies and tools Manage Identity and Access Management (IAM) systems including provisioning, de-provisioning, RBAC, and SSO integrations Collaborate with IT, DevOps, Infrastructure, and Compliance teams to ensure robust security posture Support audits, risk assessments , and compliance initiatives (ISO, SOC2, etc.) Document and update security architectures, standards, and operational procedures Required Skills & Experience: 8–10 years of experience in Cyber Security Engineering or Information Security roles Hands-on expertise with: Cloud security tools (AWS Security Hub, Azure Security Center, etc.) Vulnerability management (Qualys, Nessus, Tenable, etc.) DLP platforms (Symantec, Forcepoint, McAfee, etc.) IAM platforms (Okta, Azure AD, Ping Identity, SailPoint, etc.) Strong knowledge of security frameworks (NIST, CIS Controls, etc.) Excellent communication , problem-solving , and stakeholder management skills Certifications like CISSP, CISM, CEH, AWS/Azure Security are a plus Show more Show less

Posted 5 days ago

Apply

3.0 - 7.0 years

7 - 11 Lacs

Kochi

Work from Office

Naukri logo

Job Title Security Analyst Role and Responsibilities The security Analyst is a member of the CISO Regulatory & Compliance Team and will assist in ensuring the associated business units / accounts comply with applicable Conduent and NIS 2 security standards, regulations, and policies.The Security analyst will be professional, independent, impartial, and fair in all interactions. The security resource is accountable for procedures and processes that ensure the integrity, confidentiality, and availability of assigned Business units\u2019 information, applications, and infrastructure. Resource will perform routine risk assessments, security audits, and vulnerability scans to identify, evaluate, document, and remediate organization risk, control gaps and vulnerabilities. This position will be responsible for developing security reports, security recommendations, and security policies and procedures that are meaningful, defensible, and actionable for a variety of audiences as pertained to assigned business units. Perform log collection, correlation, reviews, archival, retention, and monitoring of automated alerts for items such as, and not limited to IPS/IDS alerts; change detection (FIM) alerts application firewall alerts; malware alerts rogue wireless network alerts security system health alerts; exploit attempt alerts Participate and be an integral component of audit, compliance, and regulatory functions, including and not limited to audits of system security to ensure compliance with Corporate security framework NIS 2, NIST 800-53, ISO 27001/2, PCI-DSS emerging country, state, and Federal privacy laws Primary POC in a vulnerability management program of the account that includes external and internal vulnerability scans of applications and systems external and internal penetration tests of applications and systems documentation and remediation of identified vulnerabilities and exploits routinely monitoring various communication avenues for security vulnerabilities and security patches taking a risk-based approach comparing those security vulnerabilities and security patches across the operating environments making recommendations to various IT teams on the mitigation process for those identified security vulnerabilities Coordinate with business units, operations, and technology teams for incident response, remediation, and improvement Acts as the initial point of contact to facilitate the handling of security audits and client requests Supports the creation of business continuity/disaster recovery plans, to include conducting disaster recovery tests, publishing test results, and making changes necessary to address deficiencies Maintain documentation that supports the annual Security compliance attestation as it is relevant to the assigned Business units Qualifications and Education CIPP, CRISC, CISA, CISSP, CISM, ISO or any security/IT audit certification is a plus. Minimum of Five (3 to 5) Years of experience in IT Security compliance, or Security Auditing is required. Knowledge and understanding of security controls across all security domains, such as access management, encryption, vulnerability management, authentication, authorization, network security, physical security, etc. Ability to identify security risks in application, system, and network architecture, data flow, and processes or procedures Ability to assess the organizational impact of identified security risks and recommend solutions or mitigating controls. Knowledge of security technologies, devices, and countermeasures, as well as the threats they are designed to counter. Experience with developing security reports, recommendations, policies, and procedures that are meaningful, defensible, and actionable for a variety of audiences. Familiarity with more than one framework (NIST 800-series, ISO 27000-series, PCI DSS and ISO, HIPAA, HITRUST, FISMA, FedRAMP other common security control frameworks). Experience in PowerPoint, Word, Excel; experience with Visio and MS Project. Communication skills (interpersonal, verbal, presentation written, email). Experience to write report segments and to participate in presentations. Familiarity with security, workflow, and collaboration tools such Nessus Tenable, Splunk, SharePoint and ServiceNow (Snow) is a plus Positive attitude, team player, self-starter; takes initiative, ability to work independently and effectively with all levels of staff and management both internally and externally Preferred Skills Creating and Maintaining NIST 800-53-rev5 based SSP and POAM Familiarity with more than one framework (NIST 800-series, ISO 27000-series, PCI DSS and ISO, HIPAA, HITRUST, FISMA, FedRAMP other common security control frameworks).

Posted 5 days ago

Apply

2.0 - 4.0 years

0 Lacs

Kalyan Dombivli, Maharashtra, India

Remote

Linkedin logo

Cybersecurity - Project Management Officer (PMO) Dombivli, Mumbai Note: Looking only for candidates who can join within 30 days . Outstation candidates must be willing to relocate. Candidate for this role will be working on client project at the client’s office in Dombivli, Mumbai. 5 days WFO, Saturday WFH . Job Overview: The PMO will be responsible for overseeing & streamlining delivery of security testing engagements— specifically for Payment Gateway (PG) clients. Ensuring timely delivery, resource optimization, effective coordination with stakeholders and adherence to compliance & quality standards. This role bridges the gap between the technical testing team & business stakeholders to ensure smooth execution of projects. Qualifications: MBA or BBA with 2-4 years ’ experience working in project management for IT/ software industry. Hands on experience with project management tools such as Zoho helpdesk or Zoho Projects, is a must. Candidate should have project management certifications such as PMI-ACP or CAPM or PMP or similar (mandatory). Background in cybersecurity would be preferred. Job description: Project Planning & Tracking Maintain and update project trackers for multiple PG security testing engagements. Monitor project milestones, deadlines, and deliverables. Track actual vs. planned timelines and raise alerts on delays or deviations. Ensure daily/weekly status reporting from security consultants is accurate and up to date. Track daily utilization, workload distribution, and resource conflicts. Maintain visibility into pipeline projects to plan for resource ramp-up/down. Serve as a point of contact for internal and external stakeholders for project-related queries and escalations. Set up governance calls, circulate agendas, track MOMs, and follow up on action items. Communicate progress, risks, and dependencies to clients in a structured and timely manner. Ensure projects follow standardized security testing workflows (web, API, mobile, infra). Track closure of client queries, validations, and retesting requests. Own the preparation and maintenance of client-facing dashboards (project status, vulnerability metrics, SLA adherence). Track daily task sheet updates from consultants and prepare weekly/monthly performance summaries. Highlight red flags and recommend corrective actions proactively. Analyze project data to identify trends, insights, and areas for improvement Establish and maintain effective communication channels with stakeholders to ensure alignment and transparency. Facilitate stakeholder meetings, and presentations to gather requirements and provide project updates. Manage stakeholder expectations and address stakeholder concerns in a timely manner. Technical Skills: Project Tools: Jira, MS Project, Smartsheet, ServiceNow (GRC module) Security Tools (basic familiarity): Qualys, Nessus, Rapid7, Tenable Documentation & Reporting: MS Excel (pivot, charts), PowerPoint, Power BI or similar. Requirements and skills Proven work experience as a Project Management Officer or similar role Strong leadership skills and stakeholder management skills Strong analytical and problem-solving skills Good written and verbal communication skills Strong attention to details and technicalities Excellent organizational and technical abilities Good interpersonal and multi-tasking skills Relevant training and/or certification Show more Show less

Posted 5 days ago

Apply

0.0 - 5.0 years

0 Lacs

Kolkata, West Bengal

On-site

Indeed logo

Relevant Experience: 5-7 Years on SOC Operation Education: BE/BTECH/MCA/BCA/MSC/BSC in Computer Science Certification: CISA/CISSP/CISM/Any OEM Certification in the field of IT Security Skills – Security Tools : Ø ArcSight (SIEM) Ø DLP Ø WAF Ø DAM Ø NBA Ø PIM Ø AlgoSec Ø Anti Malware Ø Cisco HCI Ø Tenable Job Type: Full-time Pay: ₹800,000.00 - ₹1,400,000.00 per year Schedule: Rotational shift Ability to commute/relocate: Kolkata, West Bengal: Reliably commute or planning to relocate before starting work (Required) Application Question(s): What is your current CTC? What is your expected CTC? What is your notice period? What is your current location? In which of the following tools do you have hands-on experience? (ArcSight, DLP, WAF, DAM, NBA, PIM, AlgoSec, Anti Malware, Cisco HCI, Tenable) Which level are you supporting? Experience: total work: 5 years (Required) SOC Operation: 5 years (Required) Work Location: In person

Posted 5 days ago

Apply

5.0 years

0 Lacs

Thiruvananthapuram, Kerala, India

On-site

Linkedin logo

The world's top banks use Zafin's integrated platform to drive transformative customer value. Powered by an innovative AI-powered architecture, Zafin's platform seamlessly unifies data from across the enterprise to accelerate product and pricing innovation, automate deal management and billing, and create personalized customer offerings that drive expansion and loyalty. Zafin empowers banks to drive sustainable growth, strengthen their market position, and define the future of banking centered around customer value. Qualifications Required . Bachelor's or Master's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Equivalent professional experience is acceptable. Minimum 5+ years of experience in Azure cloud operations, with a demonstrated focus on security and vulnerability management. Proven track record of managing and securing large-scale Azure environments in production. Hands-on experience with vulnerability scanning, remediation, and compliance in enterprise cloud environments. Extensive experience in responding to and managing security incidents and threat mitigation in Azure. Technical Skills Azure Expertise : In-depth knowledge of Azure services, including but not limited to: Azure Security Center Azure Defender Azure Key Vault Azure Policy Azure Sentinel (SIEM) Azure Active Directory (Azure AD) Security and Vulnerability Tools : Proficiency with vulnerability scanning and management tools like Qualys, Tenable Nessus, or Rapid7. Experience with Azure-native security tools for threat detection and remediation. Infrastructure Hardening : Strong knowledge of security best practices for securing virtual machines, storage accounts, AKS, and network components. Familiarity with zero-trust architecture principles and implementation in Azure. Automation & Scripting : Advanced skills in scripting languages such as PowerShell, Azure CLI, Python, or other automation tools to remediate vulnerabilities and improve operational efficiency. Experience in integrating security checks into CI/CD pipelines. Certifications (Preferred or Mandatory) Azure Cloud Certifications: Microsoft Certified: Azure Administrator Associate (AZ-104) Microsoft Certified: Azure Security Engineer Associate (AZ-500) Microsoft Certified: Cybersecurity Architect Expert (SC-100) Security Certifications: Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) CompTIA Security+ GIAC certifications (e.g., GCIH, GSEC, or GCED) Other Requirements Familiarity with regulatory and compliance standards, such as ISO 27001, SOC 2, GDPR, or HIPAA. Experience in performing and supporting audits related to cloud security. Proven ability to stay current with evolving cloud and cybersecurity trends. What's in it for you Joining our team means being part of a culture that values diversity, teamwork, and high-quality work. We offer competitive salaries, annual bonus potential, generous paid time off, paid volunteering days, wellness benefits, and robust opportunities for professional growth and career advancement. Want to learn more about what you can look forward to during your career with us? Visit our careers site and our openings: zafin.com/careers Zafin welcomes and encourages applications from people with disabilities. Accommodations are available on request for candidates taking part in all aspects of the selection process. Zafin is committed to protecting the privacy and security of the personal information collected from all applicants throughout the recruitment process. The methods by which Zafin contains uses, stores, handles, retains, or discloses applicant information can be accessed by reviewing Zafin's privacy policy at https://zafin.com/privacy-notice/. By submitting a job application, you confirm that you agree to the processing of your personal data by Zafin described in the candidate privacy notice. Show more Show less

Posted 6 days ago

Apply

3.0 - 5.0 years

6 - 9 Lacs

Navi Mumbai

Work from Office

Naukri logo

Title The Information Security team defends the company’s digital infrastructure by designing, implementing, and improving the company’s cybersecurity architecture. This is a critical role responsible for protecting infrastructure, cloud, edge devices, and data against unauthorized use, modification, exfiltration, or damage. This role identifies threats, manages projects and engineers solutions that impact the entire company. An ideal candidate for this role is technical, dedicated to learning new things, security-minded, strong initiative, and able to manage projects autonomously. Overview Medpace is a full-service clinical research organization (CRO). We provide Phase I-IV clinical development services to the biotechnology, pharmaceutical and medical device industries. Our mission is to accelerate the global development of safe and effective medical therapeutics through its scientific and disciplined approach. We leverage local regulatory and therapeutic expertise across all major areas including oncology, cardiology, metabolic disease, endocrinology, central nervous system, anti-viral and anti-infective. Headquartered in Cincinnati, Ohio, employing more than 5,000 people across 40+ countries. Responsibilities Engineer security solutions without oversight and collaborate with multiple departments; Analyze security systems and seek improvements on a continuous basis; Research vulnerabilities, perform vulnerability scanning, and mitigate threats; Develop security best practices and policies for the organization; Document new processes, cross-train coworkers, and assist employees on security-related matters; Provide security awareness training and testing for employees to verify proper security protocols are being followed; Staying current with cybersecurity knowledge by participating in educational opportunities, reading professional publications, and participating in professional organizations; Performing cyber security incident response, and remediation activities; and Facilitate access reviews of company data and revoke inappropriate/overprovisioned access in order to drive least privilege access. Qualifications Require at least a bachelor’s degree preferably in Information Technology; Require a minimum of at least 2 years of experience in implementing Information Security solutions; Understanding of security best practices and how to implement them at a business-wide level; Experience with managing, configuring, and deploying enterprise-grade security solutions in some of the following: SIEM Privileged Access Management/Identity Access Management/Multifactor Authentication Endpoint Detection & Response Network Access Control Cloud based architecture such as Azure/AWS Active Directory Soft skills including excellent communication skills, critical thinking skills with the ability to solve problems as they arise, and ability to prioritize projects; and Basic scripting skills, such as PowerShell/Python scripting. Nice to have: Experience with vulnerability assessment tools such as Nessus and Tenable; Experience with enterprise web proxy solutions, web filters, and VPN; Experience with email security solutions; Experience with firewall and network architecture; Experience with administrating Windows environment including GPO and servers; Previous employment or experience in a highly regulated industry such as healthcare, financial, or defense experience with standards such as ISO, NIST, HIPAA, GDPR, SOC Type 2, etc; and Auditing and policy-writing experience. People. Purpose. Passion. Make a Difference Tomorrow. Join Us Today. The work we’ve done over the past 30+ years has positively impacted the lives of countless patients and families who face hundreds of diseases across all key therapeutic areas. The work we do today will improve the lives of people living with illness and disease in the future. Medpace Perks Flexible work environment Competitive compensation and benefits package Competitive PTO packages Structured career paths with opportunities for professional growth Company-sponsored employee appreciation events Employee health and wellness initiatives Awards Recognized by Forbes as one of America's Most Successful Midsize Companies in 2021, 2022, 2023 and 2024 Continually recognized with CRO Leadership Awards from Life Science Leader magazine based on expertise, quality, capabilities, reliability, and compatibility What to Expect Next A Medpace team member will review your qualifications and, if interested, you will be contacted with details for next steps.

Posted 6 days ago

Apply

4.0 - 9.0 years

0 Lacs

India

Remote

Linkedin logo

Job Title: Sr. SecOps Engineer Experience: 4 - 9 Years Location: Remote Contract Duration: Long Term Work Time: 1 PM - 10 PM or 2 PM - 11 PM IST Job Summary We seek innovative professionals who adapt to change and thrive in fast-paced environments. You will join an engineering team that builds scalable systems, secures infrastructure, and applies advanced technologies to protect and transform financial services. If you are passionate about cybersecurity, infrastructure design, and proactive defense, we encourage you to apply. Responsibilities Gain deep understanding of the company’s tech stack to assess vulnerabilities and propose security solutions Monitor IT control environments to identify key risks, control gaps, and report findings Support third-party vulnerability testing processes and document results Collaborate with internal stakeholders to address systemic security concerns Perform monitoring using security tools and oversee remediation efforts Identify and analyze threats and vulnerabilities, ensuring timely resolution Implement and maintain consistent, cost-effective security controls and procedures Track and document security-related incidents for efficient resolution Support audits and risk assessments with documentation and evidence Assist management in corrective action planning based on audit findings Lead or participate in implementation of new security initiatives Stay updated on technology and security trends to recommend improvements Help develop company-wide IT and information security best practices Primary Skills 4–6 years of experience in design, testing, development, migration, and integration within mid to large organizations Experience in conducting vulnerability scans across various environments Hands-on with vulnerability scanning, incident response, endpoint detection, monitoring, and logging Strong understanding of current security threats, tools, and network technologies Practical knowledge of AWS core services such as VPC, EC2, S3, RDS, ELB, ALB, WAF, Lambda Proficiency in programming languages such as Python, Java, or Go Experience with both Windows and Linux operating systems Proficient in using scanning tools like Qualys, Rapid7 Nexpose, or Tenable Nessus Familiarity with EDR tools such as Tanium, Crowdstrike, Cisco AMP, or McAfee Skilled in monitoring tools like Splunk, Loggly, or Kibana Experience with automation and configuration tools like Jenkins, Puppet, Chef, CloudFormation, Terraform, or Ansible Knowledge of version control and CI/CD tools: Git, Nexus, Gradle, Groovy, YML Understanding of AWS security capabilities: WAF, GuardDuty, Security Groups, IAM Familiar with baseline configuration standards (CIS Benchmarks or DISA STIGs) Strong communication and presentation skills Security certifications such as CISSP, GSEC, CEH are a plus Show more Show less

Posted 6 days ago

Apply

3.0 years

0 Lacs

Gurgaon, Haryana, India

On-site

Linkedin logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Infrastructure Security Vulnerability Management Operations Good to have skills : NA Minimum 3 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Summary: As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting security controls, and overseeing the transition to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure that the implemented solutions align with organizational objectives, all while maintaining a focus on continuous improvement and risk management. Roles & Responsibilities: -Remediation of vulnerabilities -Exp in Tenable,Wiz.IO, Checkmarx and Burpsuite -Defining Scan schedule -Reporting and Dashboard -Metrics driven dashboards Professional & Technical Skills: -Establish and operationalize an enterprise vulnerability management program, including: - Scanner deployment and configuration - VM operating procedures - Remediation working group - Attack surface management procedures - Vulnerability intelligence integration - Exception handling procures - vulnerability risk standard -To integrate VM program operations with existing Cloud security, GRC and IT capabilities/processes. -Scanning of Scout's entire IP space (internal and external) using Tenable. Scanning technology will be provided by Scout. -End-to-end centralized operations of the vulnerability management program encompassing all identified vulnerabilities resulting from penetrating testing, infrastructure scanning, DAST, and OT security assessments, and including risk analysis, remediation support, exception handling, mitigation, and reporting. Additional Information: - The candidate should have minimum 3 years of experience in Infrastructure Security Vulnerability Management Operations. - This position is based at our Gurugram office. - A 15 years full time education is required. Show more Show less

Posted 6 days ago

Apply

2.0 - 4.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

What Success Looks Like In This Role Vulnerability Management: Experience with vulnerability management tools (e.g., Tenable, Qualys), including actions to remediate identified vulnerabilities Experience in working at “responsibility without authority” engagements for vulnerability remediation Threat Analysis: Perform in-depth analysis of security events and provide actionable intelligence to prevent future incidents. Root Cause Analysis: Conduct post-incident analysis to determine the root cause of incidents and assist in developing mitigation strategies to prevent recurrence. Collaboration: Work closely with other internal teams, such as IT, legal, and compliance, to mitigate and remediate security incidents and provide necessary incident reporting. Security Tools Support: Support the installation and management of security tools such as SIEM, IDS/IPS, endpoint detection & response (EDR), and firewall systems. Continuous Improvement: Contribute to the development and refinement of incident response processes, playbooks, and security protocols. Expected Knowledge And Experience Incident Response: experience in security incident response and resolution, including malware outbreaks, network intrusions, and data breaches alerts monitoring and root-cause analysis. Cybersecurity Frameworks: Familiarity with security frameworks such as NIST, MITRE ATT&CK, and SANS. Tools & Technologies: Familiarity with security technologies and platforms (e.g., SIEMs like Splunk, Tenable; EDR tools like CrowdStrike; firewalls, IDS/IPS systems). Network & Systems: Understanding of network protocols, operating systems (Windows, Linux), and web applications, and how they can be exploited in attacks. Threat Intelligence: Familiarity with threat intelligence feeds and using them to inform incident response and proactively detect threats. Incident Response: Support the analysis and documentation of security incidents, including timelines, actions taken, and outcomes. Reporting: Provide clear and concise incident reports and updates to senior management and relevant stakeholders. Cloud Security: Understanding of cloud platforms (AWS, Azure, GCP) and security implications within cloud environments. Regulatory Compliance: Knowledge of relevant regulatory requirements (e.g., GDPR, ISO27001, PCI-DSS) and how they relate to incident management and reporting. Preferred Qualifications Certifications: Relevant cybersecurity and/or privacy certifications are expected. Scripting Skills: Familiarity with scripting or automation (Python, Bash, PowerShell) for incident investigation and response tasks. Forensics: Understanding of digital forensics, including evidence collection, chain of custody, and data analysis techniques. Skills & Competencies Strong analytical and problem-solving skills. Solid knowledge of MS Excel. Excellent verbal and written communication skills. Ability to handle high-pressure situations and make quick decisions. Ability to work both independently and as part of a collaborative team. Detail-oriented with strong organizational and documentation skills. You will be successful in this role if you have: BA/BS degree and 2-4 years’ relevant experience OR equivalent combination of education and experience Unisys is proud to be an equal opportunity employer that considers all qualified applicants without regard to age, blood type, caste, citizenship, color, disability, family medical history, family status, ethnicity, gender, gender expression, gender identity, genetic information, marital status, national origin, parental status, pregnancy, race, religion, sex, sexual orientation, transgender status, veteran status or any other category protected by law. This commitment includes our efforts to provide for all those who seek to express interest in employment the opportunity to participate without barriers. If you are a US job seeker unable to review the job opportunities herein, or cannot otherwise complete your expression of interest, without additional assistance and would like to discuss a request for reasonable accommodation, please contact our Global Recruiting organization at GlobalRecruiting@unisys.com or alternatively Toll Free: 888-560-1782 (Prompt 4). US job seekers can find more information about Unisys’ EEO commitment here. Show more Show less

Posted 1 week ago

Apply

140.0 years

6 - 7 Lacs

Gurgaon

On-site

About NCR VOYIX NCR VOYIX Corporation (NYSE: VYX) is a leading global provider of digital commerce solutions for the retail, restaurant and banking industries. NCR VOYIX is headquartered in Atlanta, Georgia, with approximately 16,000 employees in 35 countries across the globe. For nearly 140 years, we have been the global leader in consumer transaction technologies, turning everyday consumer interactions into meaningful moments. Today, NCR VOYIX transforms the stores, restaurants and digital banking experiences with cloud-based, platform-led SaaS and services capabilities. Not only are we the leader in the market segments we serve and the technology we deliver, but we create exceptional consumer experiences in partnership with the world’s leading retailers, restaurants and financial institutions. We leverage our expertise, R&D capabilities and unique platform to help navigate, simplify and run our customers’ technology systems. Our customers are at the center of everything we do. Our mission is to enable stores, restaurants and financial institutions to exceed their goals – from customer satisfaction to revenue growth, to operational excellence, to reduced costs and profit growth. Our solutions empower our customers to succeed in today’s competitive landscape. Our unique perspective brings innovative, industry-leading tech to all the moving parts of business across industries. NCR VOYIX has earned the trust of businesses large and small — from the best-known brands around the world to your local favorite around the corner. Information Security Consultant II This role is part of NCR’s Global Information Security team. This team is responsible for developing and implementing NCR’s corporate information security program. The primary goal of the program is to protect the confidentiality, integrity, and availability of information resources. Key information security functions and activities include architecture and design for NCR information security controls, developing and enforcing policies and standards, security awareness training, risk management, assessment, and testing, monitoring and metrics, incident management, and threat and vulnerability management. The Information Security Consultant shall be responsible for the day-to-day activities required to respond for both routine and high severity vulnerabilities and security incidents. The Information Security Consultant shall work in a collaborative manner with vulnerability coordinators, incident responders, key incident management team members, management, and other stakeholders to ensure vulnerabilities and security incidents are contained, eradicated, remediated and after-action review is held according to corporate policy. The Information Security Consultant is expected to contribute to weekly status calls and respond to ad-hoc requests as part of this position. The Information Security Consultant will work with stakeholders and team members to assist with improving incident response processes that are aligned with the mission of the office of the CISO. The individual should be highly skilled, motivated and detail-oriented security professional to join our dynamic team. The ideal candidate will be responsible for leading and managing our Vulnerability Management program along with Incident Management, ensuring the protection of our organization's digital assets. Key Responsibilities: Vulnerability Management: Lead the design, implementation, and continuous improvement of the enterprise-wide vulnerability management program. External attack surface management and technical remediation Run Vulnerability red team exercises and simulation for risk prioritization Oversee vulnerability assessments, scanning, and remediation efforts across all systems, networks, and applications. Collaborate with IT, GTM and product SRE teams to prioritize and remediate vulnerabilities based on risk and business impact. Develop and maintain metrics and dashboards to track vulnerability trends and remediation progress. Ensure compliance with internal policies, industry standards, and regulatory requirements (e.g., ISO 27001, NIST, CIS). Incident Management: Assist in the development and execution of the incident response plan and playbooks. Act as a key responder and advisor during cybersecurity incidents, ensuring timely containment, investigation, and recovery. Conduct post-incident reviews and root cause analyses to improve future response efforts. Provide guidance and training to internal teams on incident response best practices. Skills and Qualifications Bachelor’s or Master’s degree in Cybersecurity, Computer Science, Information Technology, or a related field. 10+ years of experience in cybersecurity, with a strong focus on vulnerability and incident management. Proven experience with vulnerability scanning tools (e.g., Qualys, Tenable, Rapid7) and SIEM/SOAR platforms. Deep understanding of threat landscapes, attack vectors, and mitigation strategies. Strong knowledge of security frameworks and standards (e.g., NIST, MITRE ATT&CK, OWASP). Excellent analytical, communication, and leadership skills. Preferred Certifications: CISSP, CISM, OSCP, CEH, or equivalent. GIAC certifications (e.g., GCIH, GCIA, GPEN) are a plus. Offers of employment are conditional upon passage of screening criteria applicable to the job EEO Statement Integrated into our shared values is NCR Voyix’s commitment to diversity and equal employment opportunity. All qualified applicants will receive consideration for employment without regard to sex, age, race, color, creed, religion, national origin, disability, sexual orientation, gender identity, veteran status, military service, genetic information, or any other characteristic or conduct protected by law. NCR Voyix is committed to being a globally inclusive company where all people are treated fairly, recognized for their individuality, promoted based on performance and encouraged to strive to reach their full potential. We believe in understanding and respecting differences among all people. Every individual at NCR Voyix has an ongoing responsibility to respect and support a globally diverse environment. Statement to Third Party Agencies To ALL recruitment agencies: NCR Voyix only accepts resumes from agencies on the preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Voyix employees, or any NCR Voyix facility. NCR Voyix is not responsible for any fees or charges associated with unsolicited resumes “When applying for a job, please make sure to only open emails that you will receive during your application process that come from a @ncrvoyix.com email domain.”

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies