Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
30.0 years
0 Lacs
Navi Mumbai, Maharashtra, India
On-site
We are hiring a full-time Information Security Analyst who is technical, dedicated to learning new things, security-minded, has strong initiative, and is able to manage projects autonomously. The Information Security team defends the company’s digital infrastructure by designing, implementing, and improving the company’s cybersecurity architecture. This is a critical role responsible for protecting infrastructure, cloud, edge devices, and data against unauthorized use, modification, exfiltration, or damage. If you’re excited to be part of a fast-growing, then Medpace is a great place to grow your career. Responsibilities Engineer security solutions without oversight while collaborating with multiple internal departments and vendors; Analyze security systems and seek continuous improvements; Research vulnerabilities, perform vulnerability scanning and alleviate threats; Mature security best practices and policies internal to the organization; Develop new processes while cross-training coworkers and assisting employees on security-related matters; Provide security awareness training and testing for employees to verify proper security protocols are being adhered to; Performing cyber security incident triage, reviewing logs, and performing remediation activities; and Review and reduce inappropriate/overprovisioned access to drive least privileged access. Qualifications Minimum of bachelor's degree, preferably in Cybersecurity or Information Technology’ Prior Internship/co-op experience within Information Security; Understanding of security best practices and how to implement them at a business-wide level; Experience with managing, configuring, and deploying enterprise-grade security solutions in some of the following: SIEM Privileged Access Management/Identity Access Endpoint Detection & Response Cloud based architecture such as Azure/AWS Active Directory Exceptional communication skills; and Fundamental scripting skills, such as PowerShell/Python. Nice to have: Experience with vulnerability assessment tools such as Nessus and Tenable; Experience with enterprise web proxy solutions, web filters, and VPN such as Zscaler; Experience with governing Windows environment including GPO; Previous employment or experience in a highly regulated industry such as healthcare, financial, or defense experience with standards such as ISO, NIST, HIPPA, and/or SOC2; and Auditing and policy-writing experience. Medpace Overview Medpace is a full-service clinical contract research organization (CRO). We provide Phase I-IV clinical development services to the biotechnology, pharmaceutical and medical device industries. Our mission is to accelerate the global development of safe and effective medical therapeutics through its scientific and disciplined approach. We leverage local regulatory and therapeutic expertise across all major areas including oncology, cardiology, metabolic disease, endocrinology, central nervous system, anti-viral and anti-infective. Headquartered in Cincinnati, Ohio, employing more than 5,000 people across 40+ countries. Why Medpace? People. Purpose. Passion. Make a Difference Tomorrow. Join Us Today. The work we’ve done over the past 30+ years has positively impacted the lives of countless patients and families who face hundreds of diseases across all key therapeutic areas. The work we do today will improve the lives of people living with illness and disease in the future. Medpace Perks Flexible work environment Competitive compensation and benefits package Competitive PTO packages Structured career paths with opportunities for professional growth Company-sponsored employee appreciation events Employee health and wellness initiatives Awards Recognized by Forbes as one of America's Most Successful Midsize Companies in 2021, 2022, 2023 and 2024 Continually recognized with CRO Leadership Awards from Life Science Leader magazine based on expertise, quality, capabilities, reliability, and compatibility What To Expect Next A Medpace team member will review your qualifications and, if interested, you will be contacted with details for next steps. EO/AA Employer M/F/Disability/Vets Show more Show less
Posted 3 weeks ago
4 - 9 years
14 - 16 Lacs
Gandhinagar
Work from Office
Job Summary A Security Analyst specializing in Vulnerability Assessment and Penetration Testing (VAPT) is responsible for evaluating and testing an organizations digital asset for vulnerabilities. This Role is responsible to manage organizations internal and external vulnerability management program from scan to resolution of identified vulnerabilities Roles and Responsibilities: Perform Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST) to identify vulnerabilities in software applications & IT Assets. Leverage threat modelling for applications to identify potential threats and suggest suitable mitigation strategies. Manage organization’s internal vulnerability management program execution, coordination, reporting and mitigation of vulnerabilities with various stakeholders. Work with external Vendor to plan, execute External VAPT on IT Assets, software applications, software code, mobile apps. Provide technical leadership in setting up SoW, complete External VAPT scan from start to closer of identified vulnerabilities. Work closely with cross function teams including IT and product development teams to close security findings, vulnerabilities. Develop and implement strategies to improve overall security posture. Knowledge And Skills Bachelor’s degree in computer science, Information Security, or a related field. Proven experience in vulnerability assessment and penetration testing. Good understanding of various Security standards like OWASP Top 10, OWASP Mobile Top 10, OWASP API Top 10, OWASP IoT Top 10, SANS Top 25, NIST. Good understanding of vulnerability severity calculation methods like CVSS Any of security certification related to VAPT, for example: Certified Security Analyst (ECSA); Licensed Penetration Tester (LPT); Offensive Security Certified Professional (OSCP); Offensive Security Certified Web Expert (OSWE); GIAC Penetration Tester (GPEN) Sound working experience with security scan products like Nessus, burp suits, Open VAS. Strong understanding of security principles, techniques, and technologies. Knowledge of application design and coding practices. Knowledge on any vulnerability management products like Qualys, Tenable, Rapid7 High level of initiative and self-direction Excellent communicator in English, both written and spoken while being able to convey information effectively at multiple levels of sensitivity and for various audiences
Posted 2 months ago
3 - 5 years
0 - 0 Lacs
Trivandrum
Work from Office
Overview: We are seeking a skilled IT Security Engineer to manage patching, endpoint security, and automation across our infrastructure. The ideal candidate will be responsible for implementing security measures, ensuring compliance, and optimizing system performance through proactive security initiatives. Key Responsibilities: Patch Management: Develop and implement an effective patching strategy for Windows, Linux, and third-party applications. Utilize Endpoint Central (ManageEngine) to deploy patches, track compliance, and troubleshoot failures. Coordinate with teams to test and schedule patch rollouts with minimal business impact. Generate patch compliance reports and remediate non-compliant systems. Endpoint Central Management: Administer and optimize ManageEngine Endpoint Central for device management, patching, and software deployment. Monitor system health, enforce policies, and manage endpoint security configurations. Automate routine endpoint tasks using custom scripts. CrowdStrike Antivirus Management: Deploy, configure, and manage CrowdStrike Falcon for endpoint protection. Monitor security s, analyze threats, and take remediation actions. Ensure endpoint devices comply with security standards and company policies. Collaborate with SOC teams to investigate security incidents and fine-tune detection rules. Scripting & Automation: Develop and maintain PowerShell, Python, or Bash scripts to automate patching, compliance checks, and endpoint management tasks. Create dashboards and reports for patch status, endpoint security, and compliance tracking. Optimize security operations through custom automation solutions. Required Skills & Qualifications: 3+ years of experience in IT security, patch management, and endpoint protection. Hands-on experience with ManageEngine Endpoint Central for endpoint and patch management. Strong knowledge of CrowdStrike Falcon or similar EDR/XDR solutions. Proficiency in scripting (PowerShell, Python, or Bash) for automation and system management. Understanding of vulnerability management tools (Qualys, Nessus, Tenable, etc.). Familiarity with compliance frameworks like ISO 27001, NIST, or CIS benchmarks. Strong troubleshooting, analytical, and communication skills. Preferred Qualifications: Experience in security hardening and compliance auditing. Knowledge of cloud-based security solutions. Relevant certifications such as CISSP, CISM, CEH, or Security+. Required Skills Patch Management,Endpoint Management,CrowdStrike
Posted 2 months ago
4 - 7 years
6 - 10 Lacs
Bengaluru
Work from Office
The Role Kyndryls Security & Resiliency is one of our most critical practices, ensuring enterprises, regardless of their size and complexity, remain secure, available, reliable, and resilient. We take Cybersecurity seriously. We're not just invested; we're committed. We're not just protecting data; we're empowering. Kyndryl is committed to making the world safer, not only by investing in state-of-the-art services and technologies but also by empowering underserved communities with essential cyber skills. When you walk through our doors, you're not only joining a team but you're also becoming part of a legacy. Welcome to Kyndryl, where Cybersecurity isn't just a job its a passion; a commitment to designing, running, and managing the most modern and reliable technology infrastructure that the world depends on every day. As a Cybersecurity Defense professional at Kyndryl, you will encompass cybersecurity, incident response, security operations, vulnerability management, and the world of cyber threat hunting and security intelligence analysis all to protect the very heartbeat of organizations their infrastructure. In this role, you won't just monitor; you'll actively engage in the relentless hunt for cyber adversaries. In a world where every click and keystroke could be a potential gateway for attackers, your role will be nothing short of critical as you seek out advanced threats, attackers, and Indicators of Compromise (IOCs). Your expertise in endpoint detection and response (EDR) will be the shield that safeguards individual workstations, laptops, servers, and other devices from cybercrime. Your responsibilities go beyond vigilance. When it comes to network security, you'll utilize Network Detection and Response (NDR) to monitor the ever-flowing currents of network traffic. The incident management process will be used as you respond and manage to cybersecurity incidents. Cybersecurity Defense is all about information. You'll gather, analyze, and interpret data applying your own and external threat intelligence to uncover potential security threats and risks. These insights and your ability to analyze complex attack scenarios will be the foundation of our security strategy helping Kyndryl stay one step ahead of security breaches. In Cybersecurity Defense at Kyndryl, youre not just protecting the present youre shaping the future of digital security. Join us on this cybersecurity venture where your expertise and creativity will have a lasting impact in the world of digital defense. Your Future at Kyndryl When you join Kyndryl, you're not just joining a company you're entering a space of opportunities. Our partnerships with industry alliances and vendors mean you'll have access to skilling and certification programs needed to excel in Security & Resiliency, while simultaneously supporting your personal growth. Whether you envision your career path as a technical leader within cybersecurity or transition into other technical, consulting, or go-to-market roles were invested in your journey. Who You Are Youre good at what you do and possess the required experience to prove it. However, equally as important you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused someone who prioritizes customer success in their work. And finally, youre open and borderless naturally inclusive in how you work with others. Required Skills and Experience 4-7 years of professional experience Experience in Vulnerability Management Practical experience with Vulnerability scanning tools in example Qualys, Tenable, Nessus etc. General understanding of how to scan infrastructure, applications, containers, Cloud against known vulnerabilities will be an advantage. Experience in SQL Solid understanding of: Windows and Linux operating system, services and how they interact. Networks/networking Familiarity with Python scripting language will be an advantage. Understanding of security audit process Good analytical skills You have good English written and spoken communication skills. Qualys certification Any Offensive security Certification added value Preferred Skills and Experience Executing Vulnerability Scans on applications, containers and infrastructure. Performing scan result analysis to reduce false positive findings. Preparing detailed Vulnerability Scanning reports. Assist in conducting a risk analysis of applications or technology solutions. Identifying, communicating, and providing targeted remediation of vulnerabilities. Collaborating with technical and management personnel across whole organization. Delivering regularly aggregated reports of vulnerability findings to the service executive.
Posted 2 months ago
10 - 15 years
35 - 40 Lacs
Chennai
Work from Office
We are seeking a DevOps Engineer with expertise in vulnerability patching for Apache Struts and Spring Framework to enhance the security and stability of our applications. The ideal candidate will be responsible for identifying, assessing, and mitigating security vulnerabilities while ensuring system reliability and compliance with industry security standards. Responsibilities Key Responsibilities: Vulnerability Management: Identify, analyze, and remediate security vulnerabilities in Apache Struts and Spring Framework across production and development environments. Patch Deployment: Apply patches, updates, and security fixes for Apache Struts and Spring Framework while ensuring application stability. Automation & Scripting: Develop and maintain automation scripts (Bash,Shell Scripting, Python, Ansible) to streamline patching and deployment processes. Configuration Management: Utilize Ansible, Terraform, Puppet, or Chef to enforce secure configurations and automate patch deployments. CI/CD Pipeline Security: Ensure Struts and Spring updates are integrated into CI/CD pipelines (Jenkins, GitLab CI, Azure DevOps). Monitoring & Compliance: Implement security monitoring tools to track vulnerabilities and ensure compliance with CIS, NIST, ISO 27001, and PCI-DSS. Incident Response: Collaborate with security teams to address vulnerabilities, perform root cause analysis, and remediate security incidents. Documentation & Reporting: Maintain accurate documentation of security patching activities, risk assessments, and compliance reports. Requirements Required Skills & Experience: xx years of experience in a DevOps, IT Security, or System Administration role. Strong knowledge of Apache Struts and Spring Framework security vulnerabilities and patching methodologies. Experience with Java application servers (Tomcat, WildFly, JBoss, WebLogic). Proficiency in Linux administration (Ubuntu, RHEL, CentOS) and Windows Server. Hands-on experience with patch management tools and security updates for Java-based applications. Expertise in PowerShell, Bash, or Python scripting for automation. Familiarity with vulnerability scanning tools (Nessus, Qualys, Tenable, Rapid7). Experience working with Docker, Kubernetes, and cloud platforms (AWS, Azure, GCP). Collaborate closely with Dev teams and work on remediation solutions by understanding application architecture .Preferred Qualifications: Certifications such as AWS Certified DevOps Engineer, RHCE, CKA (Certified Kubernetes Administrator), or CISSP. Experience working in Telecom industiries Prior experience with SIEM tools (Splunk, ELK, Datadog) for security monitoring. Prior experience with endpoint security and system hardening.
Posted 2 months ago
2 - 7 years
4 - 9 Lacs
Bengaluru
Work from Office
Tenable Security Center Experience is required Troubleshoot Nessus scanner to ensure they are always having update to plugins, latest software version Tracking Vulnerability Scanning & enumeration services activities as per the defined deliverables
Posted 2 months ago
5 - 10 years
9 - 13 Lacs
Maharashtra
Work from Office
Description Generic JD Job Responsibilities Lead cyber security initiatives and projects for the organization Work with security partners or MSP to ensure all the security due diligence is done as per best practices Design and update correlation rules based on security control situation and cyber threat circumstances, as well as create and maintain correlation guidelines and review process Determine security requirements by evaluating business policies and requirements; research information security solutions; perform system security and vulnerability scans and risk assessments; study the architecture/platform Define security strategies by specifying intrusion detection methodologies and equipment; lead the installation and calibration of equipment and software; prepare preventive and reactive measures; complete documentation Lead technology architecture practices related to Cloud infrastructure Improve the achievements and skills of the security team by planning the delivery of solutions; answer technical and procedural questions for less experienced team members; teaching improved processes; mentor team members Perform threat hunting and incident investigation over logs from SIEM Run vulnerability scans, pen. tests for IT and OT networks and remediate security gaps Respond to security incidents and analyze alerts, thresholds, logs, and threat cases Manage O365 platform and device security and improvements Monitor cloud platforms security and fine tune security dashboards and alerts Hardening of network firewall, switches, desktops and servers Conduct regular user trainings on cyber education and security policies Support technical forensic investigations Submit daily, weekly, monthly security reports to IT leadership based on risk ratings Research and evaluate new cybersecurity threats, IT trends and security controls Multitasking in high stress situations while ensuring that no details are missed Exercising good judgement when dealing with issues and ensuring a sense of urgency in their resolution while remaining calm and focused Experience with physical security standards would be plus Taking the initiative and working proactively with minimal supervision is a must Qualifications Bachelors degree or college diploma in Computer Engineering, Computer Science, or a related field, or equivalent training and experience and proven 5 to 7 years hands-on experience inIdentity and access management Cisco and other firewall architecture and integration Cyber threat hunting, research and mitigation Vulnerability assessment and pen testing Knowledge of MS Azure security, MS defender, Intune is a must Hands-on experience in cyber defense with experience in OT security would be an advantage. e.g., Experience in consulting, security monitoring, attack detection, incident response, forensics, or security engineering Experience with Intrusion Detection Systems (IDS) technologies and firewall IOCs, Analyze and/or decipher packet captures from network protocol analyzers (Wireshark, TCPdump, Nessus, Tenable etc) Experience with the full lifecycle of IT security including device provisioning, commissioning, and remote device management layers Good familiarity with manufacturing plant environment systems, Perdue model, ISA-95, cabling infrastructure, Cisco CPwE architecture and plant VLANs security layers Excellent up-to-date technical and hands-on knowledge/experience in current attack methods, detection approaches, state-of-the-art detection tools (e.g., SIEM, anomaly detection, etc), protection concepts (defense-in-depth, network protection, endpoint protection, cloud protection) Ability to manage conflicting priorities under tight deadlines with limited supervision Able to work in managed service environment and familiar with ITIL process methodologies for support and escalations Excellent knowledge of Active directory and MS Azure security policies, DNS,DHCP and TCP/IP protocols IT security related certifications such as Security+, Network+, CEH, CCIE, CCNP, PMP etc. would be an advantage NIST, ITIL Cybersecurity framework Good hands-on and strong can-do attitude Ability to drive projects by themselves and willingness to support business inititives and cross functional teams Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade D Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility No Global Role Family To be defined Local Role Name To be defined Local Skills English;IT security;identity and access management;architecture Languages RequiredENGLISH Role Rarity To Be Defined
Posted 2 months ago
5 - 10 years
15 - 25 Lacs
Bengaluru
Remote
Experience: 5+ years with experience in SNOW Vulnerability Module. Key Responsibilities: Strong background in ServiceNow Security Operations, a deep understanding of Vulnerability Management (VM), Good experience in ServiceNow development on ITSM module Excellent experience in Integrating third party tools with ServiceNow using web services and connectors Implement and manage the Vulnerability Management module in ServiceNow. Integrate vulnerability scanners with ServiceNow. Develop and automate workflows using ServiceNow Flow Designer and Orchestration to manage vulnerabilities.. Perform regular testing and validation of vulnerability data and its accuracy in the system. Create reports and dashboards in ServiceNow Performance Analytics to track vulnerabilities, remediation progress, and key metrics. Ensure compliance with regulatory standards and internal security policies through effective vulnerability tracking. Automate vulnerability response actions and integrate them with existing security incident management processes. Maintain proper documentation and provide training to teams on the ServiceNow Vulnerability Management process. Required Skills & Qualifications: Strong knowledge of ServiceNow platform, including its Security Incident Management (SIM) and Vulnerability Management (VM) modules. Familiarity with ServiceNow CMDB and how vulnerabilities relate to Configuration Items (CIs). Experience in integrating vulnerability scanning tools (e.g., Qualys, Tenable, Nessus) with ServiceNow. Experience with risk prioritization and the Common Vulnerability Scoring System (CVSS). Knowledge of Security Incident Management, Problem Management, and Change Management best practices in ServiceNow. Experience in creating reports and dashboards using ServiceNow Performance Analytics.
Posted 2 months ago
7 - 12 years
15 - 25 Lacs
Mumbai
Work from Office
Position Details- Position: VAPT and DevSecOps Lead Experience: 7-10 years Job Location: Powai, Mumbai - WORK FROM OFFICE Number of Position 1 Description: We are looking for DevSecOps Security Engineer who will be responsible for running automated and manual security scans which include but not limited to SAST, DAST, IAST, Mobile, Web, API and ad-hoc pen-testing. The candidate will play a key role of integrating Security element in DevSecOps The role entails taking responsibility of analysing security vulnerabilities and capability to provide mitigation solutions to fix issues, providing guidance to application teams, and coordinating with cross functional teams across the platform. Responsibilities: Hands-on experience creating and implementing DevSecOps pipeline using CICD automation tools like Jenkins, Automated scanning tools, BurpSuite, and open source tools. Implement Application Cyber Security Controls/Policies developed by IT Security Team. Ability to demo security vulnerability to application teams. Drive application security issues to a resolution. Provide a clear guidance to application teams during vulnerability mitigation effort Conduct application security assessment on periodic intervals and for every release Collect and report status on application security assessments including milestones, deliverables, timing, tasks, risk areas, and status to Head of IT Security Categorize and recommend assessment strategies for existing and new application development Coach development and vendor teams on application security Develop user training material on secure coding and conduct training sessions Coordinate and execute IT security projects Integrate the Application and DevOps processes and CI/CD pipelines from early stages of the development lifecycle. Evaluating and on-boarding security tools such as SAST, vulnerability and open source scanning into the Security DevOps life cycle for multiple tech stacks. Contributing features to internally developed Cyber security tools, and integrate those tools into the Security DevOps pipelines. Driving continuous improvement for Security DevOps pipelines and processes, and to the Cyber security tools, services, and processes. Engage in security research in keeping abreast of the latest security issues for Cloud enabled enterprises Research best practices for a variety of technologies and document / advice on solutions for security for multiple teams Develop, improve and monitor system compliance with the IT framework for controls and levels of access Collaborate with internal teams to manage and mitigate security vulnerabilities and risks Collaborate with software engineering and digital team to deliver integrated security solutions, and improve developer security practices Collaborate on Red Team penetration testing of IT systems Essential Qualification: Tenable/Qualys tool experience is mandatory. Experience with Dockers, Kubernetes, Terraform Good to have Appsec, API Testing, Infra Cloud Security testing experience. Must have experience with a modern version control system such as: Git, Github, GitLab. CISSP, OSCP or other security certifications desired. Experience with infrastructure as code and technologies behind it (Terraform preferred) Must have 4+ years of progressive experience in computing and information security. Capable of analysing data from various data sources and generating reports, charts and graphs. • Proven experience with at least one of the following technologies: MySQL, Postgres, FireBase, Google Cloud Storage and willing to learn and fill in any gaps. Working knowledge of agile methodology, techniques, and frameworks, such as Scrum or Kanban Excellent people and project management skills. Strong communication and presentation skills. Strong analytical and problem-solving skills.
Posted 2 months ago
8 - 11 years
25 - 30 Lacs
Hyderabad
Work from Office
Vulnerability Management (Rapid7) Overview : Candidate is responsible for identifying, analyzing, and prioritizing vulnerabilities in an organization system, applications and ensuring appropriate measures are taken to remediate them. Candidate will work closely with all required IT Teams to ensure that identifies vulnerabilities are addressed in a timely and effective manner. Responsibilities : • Conduct Regular Vulnerability assessments using tools such as Rapid 7, Qualys. • Hands on experience on Rapid7 is a must. • Analyze and prioritize the identified vulnerabilities based on risk assessment, severity, and exploitability. • Work with IT Teams to develop and implement remediation plans. • Monitor the progress of remediation efforts and provide regular updates to stakeholders. • Participate in Incident response and investigations related to vulnerabilities. • Stay up to date with latest threats and vulnerabilities and adjust the Vulnerability management accordingly. • Ensure compliance with applicable regulatory requirements. • Create reports and metrics to track the progress of the Vulnerabilities. • Be a champion for vulnerability management and information security including broadening awareness and use of the teams services, education of security best practices, and integration with other business areas. • Support teammates regarding vulnerability assessment, communication/rapport with other divisions and various levels of leadership, technical expertise, and career development. Requirements : • Bachelors Degree in computer science or related field. • At least 7-9 years of experience in vulnerability management • Familiarity with Vulnerability scan and assessment techniques. • Good understanding on CVSS scores • Excellent Analytical and Problem-solving skills • Strong communication skills Verbal and Written. • Ability to work independently. • Familiarity with security frameworks like NIST, ISO27001 and regulatory compliance like SOX. • Experience in Azure cloud. • Knowledge on Scripting languages like PowerShell or python will be advantage. • Experience with risk assessments and prioritization methodologies. Responsibilities: • Architectural Design: Develop and maintain security architecture frameworks incorporating Tenable solutions to address organizational risk, compliance, and security objectives. • Solution Integration: Design and oversee the integration of Tenable products (e.g., Tenable.io, Tenable.sc, Tenable.ot) into existing security infrastructures. • Strategic Planning: Collaborate with senior leadership to define security requirements and develop long-term security strategies. • Risk Management: Assess and mitigate risks related to vulnerabilities and threats using Tenable's tools. • Policy and Standards: Establish and enforce security policies and best practices for Tenable product implementation. • Technical Leadership: Provide technical guidance and support on the effective use of Tenable solutions. • Optimization and Innovation: Continuously evaluate and enhance security architectures and Tenable deployments. • Documentation and Reporting: Maintain comprehensive documentation of security architectures and generate reports on security posture. • Training and Awareness: Lead training sessions to enhance understanding of Tenable products and security architecture principles.
Posted 3 months ago
11 - 14 years
35 - 40 Lacs
Pune
Work from Office
Vulnerability Management (Tenable) Overview : Candidate is responsible for identifying, analyzing, and prioritizing vulnerabilities in an organization system, applications and ensuring appropriate measures are taken to remediate them. Candidate will work closely with all required IT Teams to ensure that identifies vulnerabilities are addressed in a timely and effective manner. Responsibilities: • Conduct Regular Vulnerability assessments using tools such as Tenable. • Hands-on experience on Tenable is a must. • Analyze and prioritize the identified vulnerabilities based on risk assessment, severity, and exploitability. • Work with IT Teams to develop and implement remediation plans. • Monitor the progress of remediation efforts and provide regular updates to stakeholders. • Participate in Incident response and investigations related to vulnerabilities. • Stay up to date with latest threats and vulnerabilities and adjust the Vulnerability management accordingly. • Ensure compliance with applicable regulatory requirements • Create reports and metrics to track the progress of the Vulnerabilities. • Be a champion for vulnerability management and information security including broadening awareness and use of the teams services, education of security best practices, and integration with other business areas. • Support teammates regarding vulnerability assessment, communication/rapport with other divisions and various levels of leadership, technical expertise, and career development. • Experience in integrating Tenable with Servicenow and automating Vulnerability Management process. Requirements : • Bachelor’s Degree in computer science or related field. • At least 10 years of experience in vulnerability management • Familiarity with Vulnerability scan and assessment techniques. • Good understanding of VPR, ACR, CVSS scores, Exploitation, Impact. • Should be familiar with Analysis. • Excellent Analytical and Problem-solving skills. • Strong communication skills Verbal and Written. • Ability to work independently. • Familiarity with security frameworks like NIST, ISO27001 and regulatory compliance like SOX. • Experience in Defender Vulnerability Management will be added advantage. • Knowledge of Scripting languages like PowerShell, or python will be advantage. • Experience with risk assessments and prioritization methodologies.
Posted 3 months ago
15 - 18 years
20 - 25 Lacs
Noida
Work from Office
We are seeking an experienced Senior Information Security Manager to lead our security initiatives and ensure the integrity, confidentiality, and availability of our systems and data. This role is crucial in safeguarding our digital assets and maintaining compliance with industry standards. 1.Should take care of Infosec functions by coordinating with various stakeholders 2. Lead and manage Vulnerability Assessment (VA) and Penetration Testing (PT) programs end to end. 3. Should have technical hands-on knowledge on different VAPT tools, like Qualys, Tenable, BurpSuite, Checkmarx etc. 4.Ensure all cyber security compliance directions issued from time to time by the regulator 5.Coordination with SOC, Technology team to follow up the incidents till closure 6.Follow escalation matrix for delayed issues 7.Assist in Internal and External Audits (Regulatory) and work towards closure of observations if any 8. Should have project management espouse, to run the security PMO for ensuring the multiple initiatives with internal / external teams, vendors, and regulators. 9. Prepare and review new/existing policies, procedures, and secure configure/ hardening documents. 10. Should possess technical skills and knowledge to handle/manage security solutions if required 11. Exposure to Cloud Environment 12. Knowledge of Application Security is a plus. Qualifications and Experience: 1. 15-18 years of experience in security management. 2. Strong understanding of security best practices, frameworks, and security technologies. 3. Proven experience in managing VA, PT, Patch Management, and Audit processes. 4. Familiarity with regulatory requirements and compliance standards (e.g., RBI, SEBI). 5. Demonstrated experience in project management, including planning, execution, and stakeholder management. 6. Excellent communication, interpersonal, and leadership skills. 7. Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Masters degree or relevant certifications preferred.
Posted 3 months ago
8 - 12 years
20 - 30 Lacs
Chennai, Bengaluru, Hyderabad
Work from Office
Role: Security Delivery Specialist Level: 9 Location: Bengaluru, Hyderabad, Chennai, Pune, Mumbai, Delhi Experience: 8+ Years Main Skill: Infrastructure Vulnerability management (Qualys / Nessus) / Cloud Security posture Management (CSPM) Position Summary We are seeking an experienced candidate to oversee the Accenture's infrastructure Tool Operations - vulnerability management as part of the IS Tools and Operations team and cloud security posture management (CSPM). This role involves managing the operational processes that identify, assess, and mitigate vulnerabilities across Accenture IT infrastructure and cloud environments. You will be responsible for ensuring that our Vulnerability and compliance posture is in line with industry best practices, regulatory requirements, and organizational policies. As a Specialist you will work closely with cross-functional teams, including other security teams, IT teams, DevOps, and engineering, to ensure that both cloud and on-prem infrastructure vulnerabilities are identified and addressed in a timely manner. Your role will be critical in enhancing the security and compliance posture of our cloud environments, including AWS, Azure, and Google Cloud. Key Responsibilities: Infrastructure Vulnerability Management: Oversee the identification, assessment, and remediation of vulnerabilities in cloud and on-prem infrastructure using industry-leading vulnerability scanning tools. Prepare and deliver compliance reports to management, detailing the organization's compliance status and areas for improvement Develop and maintain infrastructure vulnerability management processes and operations, ensuring continuous improvement and alignment with best practices. Oversee the Compliance reporting with various vulnerability management and other cyber security tools and provide the periodic updates to the senior management Support Business on remediation queries on Vulnerability and Compliance Work closely with DevOps, engineering, and other technical teams to respond and remediate the infrastructure and cloud vulnerabilities and reduce the risk to Accenture Support Business on remediation queries on Vulnerability and Compliance within specified timelines Perform periodic internal reviews of operating procedures and share outcome/ identify improvements Oversee and Hands-on for cloud and other On Prem IT infrastructure vulnerability remediation using industry leading vulnerability scanning tools. Perform advanced troubleshooting and analysis of scan results (Qualys, Nessus) including false positives/negatives, to ensure accurate reporting Utilize Qualys , Nessus , and other vulnerability scanning tools to conduct regular vulnerability assessments on servers, networks, endpoints, and applications Cloud Security Posture Management: Oversight the vulnerability management program for cloud environments using security posture management to continuously assess and enhance the security posture of cloud environments (AWS, Azure, Google Cloud) Leverage tools like CSPM (Cloud Security Posture Management) solutions to monitor and improve security posture across cloud platforms Collaborate with cloud architects and engineers to ensure that cloud infrastructure is secure, compliant, and follows security best practices Reporting & Metrics: Create and maintain dashboards to provide visibility into the vulnerability management program and cloud security posture. Track and report on progress, risks, and compliance reporting related to vulnerability management and cloud security posture. Periodic operational reporting to senior management. (weekly / Monthly / quarterly) Continuous improvements into the existing internal operational processes and reporting the same to senior management Review and update/create SOP's and identify improvement areas for existing processes Team Leadership & Development: Lead and mentor a team of security analysts, providing guidance on vulnerability management and cloud security best practices. Foster a culture of continuous learning and development within the team. Ensure that team members stay up to date with the latest vulnerability scanning tools, cloud security threats, trends, and technologies. Influence training plans to align with company goals Technical Skills: Strong knowledge on cyber security basics (OS level Security, protocols etc) Comprehensive understanding of security principles, techniques, and technologies Experience with Cyber security / cloud security frameworks and standards (e.g., CIS benchmark, ISO 27001, NIST) and cloud native security tools. Experience with Cloud Security Posture Management (CSPM) tools like Prisma cloud, checkpoint or similar. Knowledge of network security, firewalls, access controls, and encryption technologies. Deeper understanding of patching/ vulnerability remediation and tools such as Firemon, MFNA etc. Proficiency in vulnerability assessment and management methodologies and tools such as Qualys, tenable, EDR, Splunk etc. Experience in one or more information security technologies like Vulnerability Management, Server Configuration Compliance, Patch Management, Information Security Standards for OS and Applications Soft Skills: Excellent communication and presentation skills, with the ability to explain complex security concepts to both technical and non-technical stakeholders. Strong problem-solving skills, with a focus on driving solutions and improvements. Ability to lead and collaborate in a cross-functional environment. Strong organizational skills, with the ability to manage multiple projects and deadlines. Good to Have Skills: Knowledge/Certifications on Containers (AKS or EKS or GKE) Scripting knowledge (Python/Powershell/Bash) Knowledge on ITIL processes Knowledge on ISO 27K processes and controls Preferred Qualifications: Relevant cyber security and cloud security tools certifications or CISSP, CCSK, AWS Certified Security Specialty, CSPM Prisma cert or equivalent are highly desirable. Bachelor's degree in cyber security, Information Technology, or a related field. Experience with automation tools (e.g., Terraform, Ansible, etc.) to enforce security policies in cloud environments. Experience in risk management and compliance frameworks (e.g., SOC 2, ISO 27001, NIST). Qualifications Preferred Qualifications: Relevant cyber security and cloud security tools certifications or CISSP, CCSK, AWS Certified Security Specialty, CSPM Prisma cert or equivalent are highly desirable. Bachelors degree in cyber security, Information Technology, or a related field. Experience with automation tools (e.g., Terraform, Ansible, etc.) to enforce security policies in cloud environments. Experience in risk management and compliance frameworks (e.g., SOC 2, ISO 27001, NIST).
Posted 3 months ago
0.0 years
0 Lacs
Hyderabad, Telangana
On-site
Hyderabad, Telangana, India Category: Information Technology Hire Type: Employee Job ID 4808 Date posted 02/24/2025 We Are: At Synopsys, we drive the innovations that shape the way we live and connect. Our technology is central to the Era of Pervasive Intelligence, from self-driving cars to learning machines. We lead in chip design, verification, and IP integration, empowering the creation of high-performance silicon chips and software content. Join us to transform the future through continuous technological innovation. You Are: You are a seasoned network engineering professional with a robust background in designing and implementing enterprise network architectures. You thrive in dynamic environments and excel in providing strategic direction and innovative solutions. With your extensive experience in network and security operations, you are adept at collaborating with executive management and cross-functional teams. You possess a proactive approach, identifying opportunities for improvement and automation while maintaining a keen eye on security and performance. Your technical expertise is complemented by your ability to communicate complex concepts clearly and effectively. What You’ll Be Doing: Create architectural approaches for Enterprise Network design and implementation. Provide architectural governance and oversight over MSP supplied solutions. Explore, investigate, recommend, benchmark, and implement technologies for SDN and service orchestration. Offer in-depth Network & Security Operations subject matter expertise and guidance to executive management and other stakeholders. Collaborate with cross-functional teams to resolve complex technical issues, ensuring minimal disruption to business operations. Liaise with various vendors and suppliers to optimize existing Network Services. Provide technological vision and strategy for Network transformation, leading architecture discussions to address risk, security, capacity, and performance concerns. Maintain vulnerability management processes and policies using a risk-based priority methodology. Identify and implement opportunities for process automation and improvement. Aid with change management processes, including impact analysis, risk assessment, change plan, test plan, monitoring, and user communications. The Impact You Will Have: Drive significant productivity, robustness, agility, and time-to-market advantage in the creation of Synopsys products and solutions. Lead corporate infrastructure transformation, enhancing IT operations leadership. Improve and optimize Network Services, contributing to the overall efficiency and performance of the enterprise network. Enhance security measures and risk management, safeguarding the organization’s critical assets. Facilitate seamless collaboration across teams, ensuring timely resolution of technical issues. Contribute to the continuous improvement of network services and user experience. What You’ll Need: Demonstrated experience with risk assessments and vulnerability assessments, using tools like Qualys, Rapid7, Tenable, Wiz, etc. Expertise in Enterprise Network Architecture Designs and Security Implementations. Knowledge of Internet/DMZ/Internal Firewalls, Identity Access Management (IAM), Risk Management, Security Information Event Management (SIEM), and Web Proxy Services. Hands-on experience with network security areas such as NGFWs, IDS/IPS, SSE/SASE, SWG, ZTNA. Management and patching experience with DataCenter network technologies (e.g., Cisco ACI, Whitebox Switching with SONiC OS, BeyondEdge orchestrator, Cisco Nexus Platforms). Administration of campus infrastructure: Cisco Catalyst and Aruba OS Switching, Aruba Wireless Controllers, APs, Versa Networks SD-WAN appliances. Understanding of cloud architectures (AWS, Azure, GCP, IBM Cloud) and cloud connectivity solutions. Strong knowledge of routing protocols and failover scenarios, including BGP and OSPF. Network device configuration and infrastructure automation skills using tools such as Python and Ansible. Who You Are: Proactive and self-motivated, able to drive results with minimal supervision. Excellent communicator, capable of conveying complex technical concepts to diverse audiences. Strategic thinker with a focus on continuous improvement and innovation. Collaborative team player, adept at working with cross-functional teams. Detail-oriented and highly organized, with strong problem-solving skills. The Team You’ll Be A Part Of: The Engineering Excellence Group drives innovation velocity and enterprise infrastructure automation, which are critical elements of our growth and scaling strategy. This team is chartered to drive significant productivity, robustness, agility, and time-to-market advantage in the creation of Synopsys products and solutions. The group also leads corporate infrastructure transformation as we continue to drive IT operations leadership and invest in the next wave of disruptive technologies. Rewards and Benefits: We offer a comprehensive range of health, wellness, and financial benefits to cater to your needs. Our total rewards include both monetary and non-monetary offerings. Your recruiter will provide more details about the salary range and benefits during the hiring process. At Synopsys, we want talented people of every background to feel valued and supported to do their best work. Synopsys considers all applicants for employment without regard to race, color, religion, national origin, gender, sexual orientation, age, military veteran status, or disability.
Posted 3 months ago
8 - 13 years
5 - 15 Lacs
Ahmedabad
Work from Office
Job Summary: We are seeking a skilled and experienced Vulnerability Management Lead to join our cybersecurity team in Ahmedabad. The ideal candidate will be responsible for overseeing and enhancing our vulnerability management program. This role demands a strong understanding of cybersecurity principles, IT Infra systems, networking principles, excellent problem-solving skills, and the ability to work collaboratively with various teams. Key Responsibilities: Vulnerability Assessment and Management: Conduct regular vulnerability assessments. Analyze scan results, identify vulnerabilities, and prioritize them based on risk and impact. Collaborate with IT and application teams to ensure timely remediation of identified vulnerabilities. Provide POCs for identified vulnerabilities as and when needed. Must have experience of administrating, designing and deployment of vulnerability management tools such as Tenable, Qualys, R7 etc. Optimize scanning schedules and policies to maximize coverage and efficiency Reporting and Documentation: Generate and deliver comprehensive vulnerability reports to stakeholders. Maintain detailed records of vulnerabilities, remediation efforts, and their status. Develop and update documentation for vulnerability management processes and procedures. Stakeholder Collaboration: Work closely with IT, network, application development, and security teams to address vulnerabilities. Provide guidance and recommendations for mitigating vulnerabilities. Conduct training sessions and workshops to educate teams about vulnerability management best practices. Continuous Improvement: Stay updated on the latest vulnerabilities, threats, and industry trends. Enhance vulnerability management processes and methodologies. Evaluate and recommend new tools and technologies to improve the vulnerability management program. Qualifications: Education: - Bachelors degree in computer science, Information Technology, Cybersecurity, or a related field. Advanced degree preferred. Experience: - Minimum of 8-10 years of experience in cybersecurity with a focus on vulnerability management. - Extensive experience with VMS tools such as Tenable, Qualys, R7 etc. Skills: - Strong understanding of common vulnerabilities and exposures (CVEs), CVSS, and vulnerability databases. - In-depth knowledge of cybersecurity frameworks and standards (e.g., NIST, ISO 27001). - Proficiency in scripting and automation (e.g., Python, PowerShell) is a plus. - Excellent analytical and problem-solving skills. - Strong communication and interpersonal skills, with the ability to convey complex technical issues to non-technical stakeholders. - Ability to work independently and manage multiple tasks and projects simultaneously. Certifications (Preferred): - CISSP, CISM, CEH, or similar cybersecurity certifications.
Posted 3 months ago
0.0 years
0 Lacs
Hyderabad, Telangana
On-site
Hyderabad, Telangana, India Category: Information Technology Hire Type: Employee Job ID 4808 Date posted 02/24/2025 We Are: At Synopsys, we drive the innovations that shape the way we live and connect. Our technology is central to the Era of Pervasive Intelligence, from self-driving cars to learning machines. We lead in chip design, verification, and IP integration, empowering the creation of high-performance silicon chips and software content. Join us to transform the future through continuous technological innovation. You Are: You are a seasoned network engineering professional with a robust background in designing and implementing enterprise network architectures. You thrive in dynamic environments and excel in providing strategic direction and innovative solutions. With your extensive experience in network and security operations, you are adept at collaborating with executive management and cross-functional teams. You possess a proactive approach, identifying opportunities for improvement and automation while maintaining a keen eye on security and performance. Your technical expertise is complemented by your ability to communicate complex concepts clearly and effectively. What You’ll Be Doing: Create architectural approaches for Enterprise Network design and implementation. Provide architectural governance and oversight over MSP supplied solutions. Explore, investigate, recommend, benchmark, and implement technologies for SDN and service orchestration. Offer in-depth Network & Security Operations subject matter expertise and guidance to executive management and other stakeholders. Collaborate with cross-functional teams to resolve complex technical issues, ensuring minimal disruption to business operations. Liaise with various vendors and suppliers to optimize existing Network Services. Provide technological vision and strategy for Network transformation, leading architecture discussions to address risk, security, capacity, and performance concerns. Maintain vulnerability management processes and policies using a risk-based priority methodology. Identify and implement opportunities for process automation and improvement. Aid with change management processes, including impact analysis, risk assessment, change plan, test plan, monitoring, and user communications. The Impact You Will Have: Drive significant productivity, robustness, agility, and time-to-market advantage in the creation of Synopsys products and solutions. Lead corporate infrastructure transformation, enhancing IT operations leadership. Improve and optimize Network Services, contributing to the overall efficiency and performance of the enterprise network. Enhance security measures and risk management, safeguarding the organization’s critical assets. Facilitate seamless collaboration across teams, ensuring timely resolution of technical issues. Contribute to the continuous improvement of network services and user experience. What You’ll Need: Demonstrated experience with risk assessments and vulnerability assessments, using tools like Qualys, Rapid7, Tenable, Wiz, etc. Expertise in Enterprise Network Architecture Designs and Security Implementations. Knowledge of Internet/DMZ/Internal Firewalls, Identity Access Management (IAM), Risk Management, Security Information Event Management (SIEM), and Web Proxy Services. Hands-on experience with network security areas such as NGFWs, IDS/IPS, SSE/SASE, SWG, ZTNA. Management and patching experience with DataCenter network technologies (e.g., Cisco ACI, Whitebox Switching with SONiC OS, BeyondEdge orchestrator, Cisco Nexus Platforms). Administration of campus infrastructure: Cisco Catalyst and Aruba OS Switching, Aruba Wireless Controllers, APs, Versa Networks SD-WAN appliances. Understanding of cloud architectures (AWS, Azure, GCP, IBM Cloud) and cloud connectivity solutions. Strong knowledge of routing protocols and failover scenarios, including BGP and OSPF. Network device configuration and infrastructure automation skills using tools such as Python and Ansible. Who You Are: Proactive and self-motivated, able to drive results with minimal supervision. Excellent communicator, capable of conveying complex technical concepts to diverse audiences. Strategic thinker with a focus on continuous improvement and innovation. Collaborative team player, adept at working with cross-functional teams. Detail-oriented and highly organized, with strong problem-solving skills. The Team You’ll Be A Part Of: The Engineering Excellence Group drives innovation velocity and enterprise infrastructure automation, which are critical elements of our growth and scaling strategy. This team is chartered to drive significant productivity, robustness, agility, and time-to-market advantage in the creation of Synopsys products and solutions. The group also leads corporate infrastructure transformation as we continue to drive IT operations leadership and invest in the next wave of disruptive technologies. Rewards and Benefits: We offer a comprehensive range of health, wellness, and financial benefits to cater to your needs. Our total rewards include both monetary and non-monetary offerings. Your recruiter will provide more details about the salary range and benefits during the hiring process. At Synopsys, we want talented people of every background to feel valued and supported to do their best work. Synopsys considers all applicants for employment without regard to race, color, religion, national origin, gender, sexual orientation, age, military veteran status, or disability.
Posted 3 months ago
3 years
0 Lacs
Navi Mumbai, Maharashtra, India
Remote
Mizuho Global Services Pvt Ltd (MGS) is a subsidiary company of Mizuho Bank, Ltd, which is one of the largest banks or so called ‘Mega Banks’ of Japan. MGS was established in the year 2020 as part of Mizuho’s long-term strategy of creating a captive global processing center for remotely handling banking and IT related operations of Mizuho Bank’s domestic and overseas offices and Mizuho’s group companies across the globe. At Mizuho we are committed to a culture that is driven by ethical values and supports diversity in all its forms for its talent pool. Direction of MGS’s development is paved by its three key pillars, which are Mutual Respect, Discipline and Transparency, which are set as the baseline of every process and operation carried out at MGS. What’s in it for you? o Immense exposure and learning o Excellent career growth o Company of highly passionate leaders and mentors o Ability to build things from scratch Know more about MGS: https://www.mizuhogroup.com/asia-pacific/mizuho-global-services Walk-in drive in Mumbai Time : Between 3-5pm Date : 19-05-2025 to 23-05-2025 Relevant Skills and Experience for EDR Defender - - Project and delivery management experience 3+ years EDR administration (CrowdStrike Falcon, VMware Carbon Black, Palo Alto Network Cortex XDR, Microsoft Windows Defender, Cylance, Tanium etc.) - 3 + years of working with EDR tools performing requirements gathering, deployment, configuration, and conducting threat hunting. Relevant Skills and Experience for VAPT - • 5-7 years of experience in vulnerability assessment, penetration testing, or a related field. • Strong understanding of vulnerability management concepts, principles, and best practices. • Proficiency in using vulnerability assessment tools (e.g., Nessus, Tenable, Qualys). • Experience in conducting penetration testing using various methodologies (e.g., black box, gray box, white box). • Knowledge of common security threats, vulnerabilities, and attack vectors. • Experience with network and system security tools (e.g., firewalls, intrusion detection systems, antivirus). • Experience with scripting languages (e.g., Python, PowerShell). • Experience with cloud security (e.g., AWS, Azure, GCP). Relevant Skills and Experience for IAM - • 7-10 years of experience in IAM engineering or a related field. • Strong understanding of IAM concepts, principles, and best practices. •Experience with industry leading IAM solutions, such as SailPoint, Okta, Ping Identity, or ForgeRock. •Experience with scripting languages (e.g., Python, PowerShell). •Experience with cloud platforms (e.g., AWS, Azure, GCP). •Experience with directory services (e.g., Active Directory, LDAP). •Experience with security frameworks (e.g., NIST, ISO 27001). Relevant Experience FOR Splunk - · 7-10 years of experience in Splunk administration, engineering, or a related field. · Strong understanding of Splunk architecture, components, and workflows. · Experience with designing and implementing Splunk search processing orders (SPOs). · Experience with developing and optimizing Splunk dashboards, alerts, and reports. · Experience with integrating Splunk with other enterprise applications and systems. · Experience with data security and compliance best practices. · Experience with cloud platforms (e.g., AWS, Azure, GCP). Relevant Experience FOR ServiceNow - · 12+ years of experience in IT Service Management, with a strong focus on ServiceNow implementation. · Proven experience in leading teams and managing complex projects. · In-depth knowledge of ServiceNow modules and functionalities. · Experience with developing and optimizing ServiceNow dashboards, alerts, and reports. · Ability to communicate complex / technical issues to non-technical audiences · Proven track record of leading technical teams and managing managed services projects. Interested candidates can send resume on mgs.rec@mizuho-cb.com along with the below details. Current CTC Expected CTC NP Experience Current residential location Availability for F2F Address:Mizuho Global Services India Pvt. Ltd, 11th Floor, Q2 Building Aurum Q Park, Gen 4/1, Ttc, Thane Belapur Road, MIDC Industrial Area, Ghansoli, Navi Mumbai- 400710. Show more Show less
Posted 4 weeks ago
0 years
0 Lacs
Banjara Hills, Telangana, India
On-site
Job Description The primary responsibilities of a cloud architect include: Developing cloud strategy: Creating a cloud strategy and plan for adoption Designing cloud architecture: Designing cloud environments that meet the organization's needs Managing cloud resources: Overseeing the integration and migration of systems into the cloud Ensuring security: Developing security frameworks to protect data and applications Monitoring cloud activities: Keeping track of cloud activities and responding to technical issues Advising on cloud use: Providing advice on how to use cloud technology and deal with high-risk situations Developing and implementing cloud governance policies and procedures. Collaborating with teams: Working with IT security, vendors, and other teams Evaluating and selecting cloud applications, hardware, and software that align with business requirements. Designing and organizing cloud systems, including servers, storage, and network infrastructure. Defining best practices for migrating infrastructure, including bulk migrating applications to the cloud. Identifying and recommending cloud architecture solutions that effectively meet the company's needs. Ensuring compliance with relevant industry regulations and security standards. Training and supporting development teams on cloud architecture best practices. Ensuring the security of cloud-based data and applications against unauthorized access, theft, and other threats. Conducting regular security assessments and audits to identify vulnerabilities and develop plans to address them. Collaborating with other IT professionals, including network engineers, developers, and system administrators, to integrate cloud security measures into existing systems and processes. A strong understanding of cloud computing technologies, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Knowledge of security frameworks such as ISO 27001, NIST Cybersecurity Framework, and CIS Controls. Operational experience in Tenable Cloud security application is a must Technical Skills Extensive knowledge of cloud computing technologies and current trends. Proficiency in cloud platforms such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform. Understanding of application architecture, orchestration, virtualization, and security protocols. Familiarity with programming languages like Python, Java, and C#. Experience with infrastructure as code (IaC) and automation technologies. Knowledge of networking concepts, including DNS, TCP/IP, and HTTP. Expertise in big data architecture, cost management, and disaster recovery planning. Familiarity with cloud security best practices, including encryption, access controls, and identity management. Understanding of cloud governance and compliance requirements. Having hands-on experience on Cloud governance which includes Data privacy, Risk management, Security and compliance management, Data quality, Data lifecycle management and ownership Continuous integration and delivery (CI/CD): Writing scripts to automatically integrate new code and features into the deployment environment Automation: Using automation to make software development more consistent, reliable, and efficient Infrastructure as Code (IaC): Using scripts to automatically configure the deployment environment Configuration management: Using tools to automate the provisioning and configuration of infrastructure and servers DevOps engineers use tools like Ansible, Puppet, Chef, Docker, and Kubernetes to perform their duties. Design and implement cloud security architecture, including Identity and Access Management (IAM) Monitor for security risks, vulnerabilities, and controls Analyze, log, and respond to incidents in the cloud environment Conduct threat simulations and penetration tests to identify potential threats Manage cryptography and encryption for cloud-based data Ensure that policies and processes are in place to protect business data Certifications such as Certified Cloud Security Professional (CCSP), Certified Information Systems Security Professional (CISSP), or Certified Cloud Architect (CCA) are preferred. At Nextracker, we are leading in the energy transition, providing the most comprehensive portfolio of intelligent solar tracker and software solutions for solar power plants, as well as strategic services to capture the full value of solar power plants for our customers. Our talented worldwide teams are transforming PV plant performance every day with smart technology, data monitoring and analysis services. For us at Nextracker, sustainability is not just a word. It's a core part of our business, values and our operations. Our sustainability efforts are based on five cornerstones: People, Community, Environment, Innovation, and Integrity. We are creative, collaborative and passionate problem-solvers from diverse backgrounds, driven by our shared mission to provide smart solar and software solutions for our customers and to mitigate climate change for future generations. Culture is our Passion Show more Show less
Posted 4 weeks ago
6 years
0 Lacs
Greater Hyderabad Area
On-site
Job Description Cloud Engineer: Implement Multi cloud solutions that leverage both AWS and Azure public cloud services. Maintain cloud network that optimize performance, security and cost saving AWS Services - Working knowledge but not limited to - EC2, RDS, Redshift, VPC, Route53, Serverless, AD DS, EMR, ECS, S3, FSx, Transit Gateway, Direct Connect, Route tables and AWS monitoring tools Mandatory Working knowledge on IAM Identity Center, AWS Control Tower and all security logs of AWS Azure Services - Working knowledge but not limited to - Virtual machine, Storage Accounts, Recovery services, Load balancers, Route table, AD DS, Azure functions, CLIs, backup and all Azure monitoring services Automate cloud deployments and operations to streamline workflows and reduce manual overhead (Proficiency in automation and scripting languages). Engage with stakeholders to gather requirements and translate them into technical specifications. Provide expertise in cloud services, advising on best practices and emerging technologies. Strong understanding of cloud networking principles and hands-on experience with cloud network configuration and troubleshooting As a Cloud Engineer, key focus will be Implementation, Configuration and Development of the CICD solutions by using various cloud automation tools (Terraform, Azure DevOps, Ansible, etc.) Experience of building a range of Services in a Cloud Service provider (ideally AWS and Azure) Customer/stakeholder focus. Ability to build strong relationships with Application teams, cross functional IT and global/local IT teams Operational effectiveness - delivers solutions that align to approved design patterns and security standards Windows and Linux Operating system knowledge Perform all activities in a safe and responsible manner and support all Environmental, Health, Safety & Security requirements and programs. Clear understanding of security processes and technologies including Threat Analysis, Threat Intelligence, Threat Hunting, Vulnerability Assessment, Security Monitoring and Compliance Being well-versed in malware analysis, operating systems, active directory, encryption schemas & algorithms, IAM, authorization and authentication mechanisms, PKI and TCP/IP networking Experience in Tenable and Sentinel One EDR Strong Project Management skills are desirable Experience with Graylog, Grafana, Prometheus, OpsGenie, or SolarWinds Required Qualifications 3+ Years of Experience AWS & Azure Cloud Experience and overall 6+ years in IT Infrastructure Proven experience with AWS and Azure platforms Relevant certifications (e.g., AWS, Microsoft Azure) are highly desirable. Excellent communication skills and the ability to work collaboratively in a cross-functional team. At Nextracker, we are leading in the energy transition, providing the most comprehensive portfolio of intelligent solar tracker and software solutions for solar power plants, as well as strategic services to capture the full value of solar power plants for our customers. Our talented worldwide teams are transforming PV plant performance every day with smart technology, data monitoring and analysis services. For us at Nextracker, sustainability is not just a word. It's a core part of our business, values and our operations. Our sustainability efforts are based on five cornerstones: People, Community, Environment, Innovation, and Integrity. We are creative, collaborative and passionate problem-solvers from diverse backgrounds, driven by our shared mission to provide smart solar and software solutions for our customers and to mitigate climate change for future generations. Culture is our Passion Show more Show less
Posted 4 weeks ago
0 - 6 years
0 Lacs
Fort, Mumbai, Maharashtra
Work from Office
Job Requirements · The role would require a person with hands-on experience in Vulnerability assessment and Penetration testing program in Enterprise environment having host of tools and technologies. · Must have experience in running Vulnerability Management and Penetration testing program. · Must Have: Experience in Tools for Firewall Evasion, Abuses to IPSec VPN, Border Gateway Protocol, GRE Tunnelling. · Be able to Perform and lead an assessment or penetration test. · Must produce management dashboard for open Vulnerabilities and Risk for enterprise. · Shall be able to provide mitigating controls for open risk and exploits for the enterprise environment. · Shall maintain risk register for open cyber risks in the enterprise. · Be able to lead a red team engagement and participate in a purple team engagement. · Have experience in developing exploits and tooling from vulnerabilities both pre and post exploitation. · Should have experience with tools Burp suite, Metasploit, Tenable, SQL Map, NMAP, SCAPY, and other tools. · Knowledge of TCP/IP and other application and network level protocols. · Conduct vulnerability assessment and penetration testing and configuration review for systems and networks. · Be able to author and issue reports on assigned application and system scan. · Support and recreate proofs of concept from security reports. · Good exposure to Cloud Applications like AWS, Azure and other SAAS Applications · Experience in Automating Security tasks using Python or Java Frameworks is a bonus. · Should be able to think ""Out of the box"". · Possess ability to think and implement new attack approaches/vectors. Skills · Strong oral and written communication, analytical and problem-solving skills, as well as excellent judgment on data analysis. · Proficient in Stakeholder Management and Team Leadership · Tools – Burp suite, Metasploit, Tenable, SQL Map, NMAP, SCAPY, and other tools. Education Qualification: · BE / BTECH · Additional certification would be an added advantage: CEH, CISA, ISO27001, ISO22301, CISSP Experience: · 3-6 years of proven experience as lead in VAPT and areas having hand on experience on various tools. Job Types: Full-time, Permanent Pay: Up to ₹2,000,000.00 per year Benefits: Health insurance Paid sick time Provident Fund Schedule: Day shift Work Location: In person
Posted 4 weeks ago
0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
About The Role The L1 TSE candidate comes with a successful track record of using strong technical expertise in the cybersecurity domain of a fast-paced, enterprise SaaS company to provide world class, 24 x 7 globally available product support. Although relatively early in their career, with 2+ years relevant experience, they must have already shown the ability to effectively communicate with security professionals (e.g., SOC Analysts and management) and earn both industry and team-leading results for support case intake, along with response, update, and resolution SLA attainment. They should be passionate about helping customers in their time of need by going above and beyond in their craft. This means detailed, timely, context-based responses to questions and reported issues that are tracked closely until full resolution and satisfaction is acknowledged by the customer. They should also be adept at evaluating top themes across assigned tickets to help prioritize fixes with the biggest impact to decrease ticket load and improve CX across our client base What you’ll do: Responsible for providing first line support response to customers in accordance with quarterly timeliness and quality targets as defined by your manager, including: 95+% ≥90% SLA Attainment ≥90% SLO Attainment <25% ENG escalation Support CSAT Rating 1st Response Time Resolution Time Case Deflection Understand, troubleshoot, analyze and resolve product issues reported by the customer with a level of urgency, communication clarity, and transparency that turns escalations into positive experiences Support the sales team and CSMs with break-fix-related activities that require product expertise and knowledge Prioritize and accurately document the nature of the reported problem in case management systems (e.g., SFDC) to ensure efficient troubleshooting and tracking Provide case status and next steps to the customer through customer-verified closure according to our defined support offering and associated SLA’s Schedule live customer calls as necessary to address case issues, concerns, and ensure all commitments are met Provide possible workarounds to issues to ensure customer success in situations where a full fix is not tenable as a near-term option Track issues that tie to enhancement requests from customers and ensure a proper handoff to the CSM and Product teams for ensuing investigation and decisioning Knowing when to escalate issues to L2 Support and working with that team on the escalation until the issue is resolved Logging and managing all inbound/outbound interactions via the Salesforce CRM with customers in support cases, email, and phone Always provide an outstanding customer experience while being the customer’s advocate through the lifecycle of their support case Communicate effectively in writing and verbally with all levels of the organization both internally and externally Contribute to Knowledge Base Articles and User Guides based on support issues Must have 2+ years experience in a fast-paced, enterprise product support environment Basic understanding of, and prior experience successfully troubleshooting, issues involving email security fundamentals (i.e., DNS settings, MX Records, DMARC/DKIM) Functional understanding of supporting multiple SaaS security products requiring interactions with enterprise security professionals (e.g., SOC analysts and managers) Previous experience providing both phone and email support to highest degree of customer satisfaction, with benchmark-beating response, update, and resolution SLA’s Strong technical troubleshooting skills that enable independent issue investigation and effective, efficient collaboration with L2 Support when necessary (e.g., bug fixes and enhancements) Experience with Internet and networking technologies and products Strong written and spoken communication skills Strong ability to collaborate, coordinate and escalate issues within a team of product support professionals Soft skills oriented towards driving customer success Strong analytical and organizational skills Advanced knowledge of case management systems and CRM’s Show more Show less
Posted 4 weeks ago
0 years
0 Lacs
Kanayannur, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. TEM Senior – Vulnerability Management As a Senior with EY’s Global Delivery Services (GDS) Cybersecurity Team, you will contribute technically to client engagements and internal initiatives. An important part of your role will be to actively establish, maintain and strengthen client’s relationships. You will also identify potential business opportunities for EY within existing engagements, and report and escalate any engagement related issues to senior team members as appropriate. The opportunity In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards, and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help senior members with business development activities. Your Key Responsibilities Must have handled a Vulnerability Management process for a large enterprise using any one of the solutions: Qualys / Nexpose / Tenable or similar Must have thorough understanding about the Vulnerability Management and Exception & Exemption process on Cloud hosted systems, databases, web services and other widely deployed infrastructure components Strong knowledge and experience in Linux Experience in Nexpose and Tenable administration Working in shifts and provide weekend support Experience working with vendors to troubleshoot issues and/or operationalize new features Scripting rest API for automation (Python and/or Bash) Familiarity on databases (Oracle, Sql Server, AWS Aurora, Hadoop, MongoDB) Maintain a strong client focus by effectively serving client needs and developing productive working relationships with client personnel. Stay abreast of current business and economic developments and new pronouncements/standards relevant to the client's business. Demonstrate industry expertise (deep understanding of the industry, emerging trends, issues/challenges, key players & leading practices) Actively contribute to improving operational efficiency through standardization and process automation on client engagements and internal initiatives Skills And Attributes For Success Knowledge of Windows, Linux, UNIX, any other major operating systems. Familiarized with the latest security vulnerabilities and exploit, understanding of web-based application vulnerabilities (OWASP Top 10), cloud security and architecture Experience with scripting / programming skills (e.g., Python, PowerShell) Hands on operational experience with vulnerability management tools (e.g. Qualys, Nexpose) including the ability to deploy, configure, and run these tools Fluency in English, other language skills are considered an asset Experience in handling data using Pandas, XML libraries Exposure to handling computer networking and operating systems use cases using python. Required knowledge for Python libraries: netaddr, ipaddress, qualysapi, lxml, pandas, numpy To qualify for the role, you must have Graduates / BE / BTech / MSc / MTech / MBA in the fields of Computer Science, Information Systems, Engineering, Business or related major with minimum 3 years of work experience especially in penetration testing and vulnerability assessment. Any one of the following technical certifications: CEH, Qualys Certified Specialist, CISM Knowledge of Windows, Linux, UNIX, any other major operating systems Willingness to work in shifts and weekend Ideally, you’ll also have Project management skills Certifications: CEH, Qualys Certified Specialist, CISM What We Look For Who can perform penetration testing which includes internet, intranet, wireless, web application, social engineering and physical penetration testing and provide analysis for the testing results. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 4 weeks ago
0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. TEM Senior – Vulnerability Management As a Senior with EY’s Global Delivery Services (GDS) Cybersecurity Team, you will contribute technically to client engagements and internal initiatives. An important part of your role will be to actively establish, maintain and strengthen client’s relationships. You will also identify potential business opportunities for EY within existing engagements, and report and escalate any engagement related issues to senior team members as appropriate. The opportunity In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards, and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help senior members with business development activities. Your Key Responsibilities Must have handled a Vulnerability Management process for a large enterprise using any one of the solutions: Qualys / Nexpose / Tenable or similar Must have thorough understanding about the Vulnerability Management and Exception & Exemption process on Cloud hosted systems, databases, web services and other widely deployed infrastructure components Strong knowledge and experience in Linux Experience in Nexpose and Tenable administration Working in shifts and provide weekend support Experience working with vendors to troubleshoot issues and/or operationalize new features Scripting rest API for automation (Python and/or Bash) Familiarity on databases (Oracle, Sql Server, AWS Aurora, Hadoop, MongoDB) Maintain a strong client focus by effectively serving client needs and developing productive working relationships with client personnel. Stay abreast of current business and economic developments and new pronouncements/standards relevant to the client's business. Demonstrate industry expertise (deep understanding of the industry, emerging trends, issues/challenges, key players & leading practices) Actively contribute to improving operational efficiency through standardization and process automation on client engagements and internal initiatives Skills And Attributes For Success Knowledge of Windows, Linux, UNIX, any other major operating systems. Familiarized with the latest security vulnerabilities and exploit, understanding of web-based application vulnerabilities (OWASP Top 10), cloud security and architecture Experience with scripting / programming skills (e.g., Python, PowerShell) Hands on operational experience with vulnerability management tools (e.g. Qualys, Nexpose) including the ability to deploy, configure, and run these tools Fluency in English, other language skills are considered an asset Experience in handling data using Pandas, XML libraries Exposure to handling computer networking and operating systems use cases using python. Required knowledge for Python libraries: netaddr, ipaddress, qualysapi, lxml, pandas, numpy To qualify for the role, you must have Graduates / BE / BTech / MSc / MTech / MBA in the fields of Computer Science, Information Systems, Engineering, Business or related major with minimum 3 years of work experience especially in penetration testing and vulnerability assessment. Any one of the following technical certifications: CEH, Qualys Certified Specialist, CISM Knowledge of Windows, Linux, UNIX, any other major operating systems Willingness to work in shifts and weekend Ideally, you’ll also have Project management skills Certifications: CEH, Qualys Certified Specialist, CISM What We Look For Who can perform penetration testing which includes internet, intranet, wireless, web application, social engineering and physical penetration testing and provide analysis for the testing results. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 4 weeks ago
0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. TEM Senior – Vulnerability Management As a Senior with EY’s Global Delivery Services (GDS) Cybersecurity Team, you will contribute technically to client engagements and internal initiatives. An important part of your role will be to actively establish, maintain and strengthen client’s relationships. You will also identify potential business opportunities for EY within existing engagements, and report and escalate any engagement related issues to senior team members as appropriate. The opportunity In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards, and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help senior members with business development activities. Your Key Responsibilities Must have handled a Vulnerability Management process for a large enterprise using any one of the solutions: Qualys / Nexpose / Tenable or similar Must have thorough understanding about the Vulnerability Management and Exception & Exemption process on Cloud hosted systems, databases, web services and other widely deployed infrastructure components Strong knowledge and experience in Linux Experience in Nexpose and Tenable administration Working in shifts and provide weekend support Experience working with vendors to troubleshoot issues and/or operationalize new features Scripting rest API for automation (Python and/or Bash) Familiarity on databases (Oracle, Sql Server, AWS Aurora, Hadoop, MongoDB) Maintain a strong client focus by effectively serving client needs and developing productive working relationships with client personnel. Stay abreast of current business and economic developments and new pronouncements/standards relevant to the client's business. Demonstrate industry expertise (deep understanding of the industry, emerging trends, issues/challenges, key players & leading practices) Actively contribute to improving operational efficiency through standardization and process automation on client engagements and internal initiatives Skills And Attributes For Success Knowledge of Windows, Linux, UNIX, any other major operating systems. Familiarized with the latest security vulnerabilities and exploit, understanding of web-based application vulnerabilities (OWASP Top 10), cloud security and architecture Experience with scripting / programming skills (e.g., Python, PowerShell) Hands on operational experience with vulnerability management tools (e.g. Qualys, Nexpose) including the ability to deploy, configure, and run these tools Fluency in English, other language skills are considered an asset Experience in handling data using Pandas, XML libraries Exposure to handling computer networking and operating systems use cases using python. Required knowledge for Python libraries: netaddr, ipaddress, qualysapi, lxml, pandas, numpy To qualify for the role, you must have Graduates / BE / BTech / MSc / MTech / MBA in the fields of Computer Science, Information Systems, Engineering, Business or related major with minimum 3 years of work experience especially in penetration testing and vulnerability assessment. Any one of the following technical certifications: CEH, Qualys Certified Specialist, CISM Knowledge of Windows, Linux, UNIX, any other major operating systems Willingness to work in shifts and weekend Ideally, you’ll also have Project management skills Certifications: CEH, Qualys Certified Specialist, CISM What We Look For Who can perform penetration testing which includes internet, intranet, wireless, web application, social engineering and physical penetration testing and provide analysis for the testing results. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 4 weeks ago
0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. TEM Senior – Vulnerability Management As a Senior with EY’s Global Delivery Services (GDS) Cybersecurity Team, you will contribute technically to client engagements and internal initiatives. An important part of your role will be to actively establish, maintain and strengthen client’s relationships. You will also identify potential business opportunities for EY within existing engagements, and report and escalate any engagement related issues to senior team members as appropriate. The opportunity In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards, and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help senior members with business development activities. Your Key Responsibilities Must have handled a Vulnerability Management process for a large enterprise using any one of the solutions: Qualys / Nexpose / Tenable or similar Must have thorough understanding about the Vulnerability Management and Exception & Exemption process on Cloud hosted systems, databases, web services and other widely deployed infrastructure components Strong knowledge and experience in Linux Experience in Nexpose and Tenable administration Working in shifts and provide weekend support Experience working with vendors to troubleshoot issues and/or operationalize new features Scripting rest API for automation (Python and/or Bash) Familiarity on databases (Oracle, Sql Server, AWS Aurora, Hadoop, MongoDB) Maintain a strong client focus by effectively serving client needs and developing productive working relationships with client personnel. Stay abreast of current business and economic developments and new pronouncements/standards relevant to the client's business. Demonstrate industry expertise (deep understanding of the industry, emerging trends, issues/challenges, key players & leading practices) Actively contribute to improving operational efficiency through standardization and process automation on client engagements and internal initiatives Skills And Attributes For Success Knowledge of Windows, Linux, UNIX, any other major operating systems. Familiarized with the latest security vulnerabilities and exploit, understanding of web-based application vulnerabilities (OWASP Top 10), cloud security and architecture Experience with scripting / programming skills (e.g., Python, PowerShell) Hands on operational experience with vulnerability management tools (e.g. Qualys, Nexpose) including the ability to deploy, configure, and run these tools Fluency in English, other language skills are considered an asset Experience in handling data using Pandas, XML libraries Exposure to handling computer networking and operating systems use cases using python. Required knowledge for Python libraries: netaddr, ipaddress, qualysapi, lxml, pandas, numpy To qualify for the role, you must have Graduates / BE / BTech / MSc / MTech / MBA in the fields of Computer Science, Information Systems, Engineering, Business or related major with minimum 3 years of work experience especially in penetration testing and vulnerability assessment. Any one of the following technical certifications: CEH, Qualys Certified Specialist, CISM Knowledge of Windows, Linux, UNIX, any other major operating systems Willingness to work in shifts and weekend Ideally, you’ll also have Project management skills Certifications: CEH, Qualys Certified Specialist, CISM What We Look For Who can perform penetration testing which includes internet, intranet, wireless, web application, social engineering and physical penetration testing and provide analysis for the testing results. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 4 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2