Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
1.0 - 5.0 years
0 Lacs
karnataka
On-site
We are seeking a Cyber Threat Intelligence Analyst to join our team. As a Cyber Threat Intelligence Analyst, you will be responsible for analyzing, detecting, and communicating cyber threats. Your role will involve collaborating with various teams such as incident responders, SIEM engineering teams, vulnerability management, and more. You should have at least 1 year of experience in security research and a functional understanding of common threat analysis models. Your main responsibilities will include maintaining awareness of the cyber threat landscape, providing updates to leadership and InfoSec teams, completing alert tickets, and various types of monitoring. You will be involved in activities such as brand protection, VIP protection, found credentials, sanctions monitoring, subscription reselling, and fraudulent applications. Your feedback on processes will be crucial for enhancing and improving maturity levels. Additionally, you will be responsible for producing threat intelligence products, reports, and intelligence briefings for NewsCorp's tactical and strategic stakeholders. You will need to establish and apply a threat modeling methodology to identify, classify, prioritize, and report cyber threats using a structured approach. Collaboration with peer teams and maintaining intelligence gathering practices across various sources will also be part of your role. To qualify for this position, you should have at least 1 year of experience in security research, excellent writing and critical thinking skills, and a functional understanding of common threat analysis models. Experience in Information Security, Threat Intelligence tools, and Management platforms is required. Strong knowledge of attack vectors, tactics, techniques, and procedures employed by cyber threat actors is essential. The ability to effectively communicate complex technical information to both technical and non-technical audiences is a must. Preferred qualifications for this role include security certifications such as CTIA, GCTI, GCIH, GDAT, OSCP, CHFI, and CEH. Desired qualifications include excellent communication skills, experience working in a large enterprise environment, strong analytical skills, ability to work independently and collaboratively, and the capacity to handle confidential material professionally. If you are looking for a challenging role in Cyber Threat Intelligence and possess the required qualifications and skills, we encourage you to apply for this position. Join us at NTS Technology Services Pvt. Ltd. to be a part of our dynamic team at NewsCorp.,
Posted 1 day ago
5.0 - 9.0 years
0 Lacs
chennai, tamil nadu
On-site
WPP is the creative transformation company. We use the power of creativity to build better futures for our people, planet, clients, and communities. Working at WPP means being part of a global network of more than 100,000 talented people dedicated to doing extraordinary work for our clients. We operate in over 100 countries, with corporate headquarters in New York, London, and Singapore. WPP is a world leader in marketing services, with deep AI, data, and technology capabilities, global presence, and unrivalled creative talent. Our clients include many of the biggest companies and advertisers in the world, including approximately 300 of the Fortune Global 500. Our people are the key to our success. We're committed to fostering a culture of creativity, belonging, and continuous learning, attracting and developing the brightest talent, and providing exciting career opportunities that help our people grow. The Cyber Incident Responder will be responsible for managing the organization's response to all severity levels (Sev 1-4) of security incidents. The role involves leading the investigation, recovery, and follow-up of security incidents, allocated based on time of day, business area, and the individual's skills and experience. The responder will work closely with the team to ensure timely recovery from security incidents and collaborate with other departments to implement processes, procedures, and technologies to prevent future occurrences. Additionally, the role includes reviewing, improving, and maintaining a comprehensive suite of security incident response procedures and playbooks. The Cyber Incident Responder will also be expected to conduct threat analysis, provide incident reports, and participate in post-incident reviews to identify lessons learned and areas for improvement. **Responsibilities:** - Manage Security Incidents: Effectively oversee the management, investigation, and forensic analysis of security incidents. - Team Collaboration: Collaborate with team members to optimize incident response processes, procedures, and approaches. - Procedure and Playbook Maintenance: Continuously review, enhance, and maintain security incident response procedures and playbooks. - Stakeholder Engagement: Develop and maintain strong relationships with internal stakeholders, suppliers, and external agencies. - Incident Simulations: Participate in and enhance regular cyber security incident simulations and exercises to ensure preparedness. - Threat Analysis and Reporting: Conduct threat analysis, generate incident reports, and participate in post-incident reviews to identify lessons learned and areas for improvement. **Requirements:** - Computer Science Degree (desirable but not essential) - CISSP or similar - Certified Incident Handler or similar - Certified Forensic Analyst or similar - Experience of managing security incidents within a large multinational organization - Experience of driving security investigations and forensics - Experience of working within a high pressured security incident response team - Experience of working with suppliers, external stakeholders, and internal teams and developing strong and trusting working relationships - Ability to communicate effectively with senior management **Who you are:** - You're open, inclusive, collaborative, and open-minded - You're optimistic, believing in the power of creativity, technology, and talent - You're extraordinary, fostering a culture of creativity and collaboration WPP offers passionate, inspired people the opportunity to create extraordinary work at an unparalleled scale in the industry. The challenging and stimulating work environment encourages creative problem solvers to excel. If you are up for the challenge and seek a culture of respect and equal opportunities, WPP is the place for you.,
Posted 3 days ago
5.0 - 9.0 years
0 Lacs
hyderabad, telangana
On-site
As a SOC Manager at NTT DATA, you will play a crucial role in leading the Security Operations Center (SOC) team to monitor, detect, and respond to security incidents. Your responsibilities will include managing the day-to-day operations of the SOC, ensuring compliance with security policies, and providing strategic direction to enhance the security posture of the Managed Security Service Provider (MSSP) and its clients. Your primary duties will involve team leadership and management, incident response, security monitoring and analysis, strategic planning, client management, reporting, and documentation. You will lead and mentor a team of security analysts and engineers, develop training programs, and conduct performance reviews. Additionally, you will oversee the incident response process, develop incident response playbooks, and coordinate with other departments and clients during major security incidents. In terms of security monitoring and analysis, you will ensure effective monitoring of client networks and systems for security threats, analyze security data and trends, and implement security tools and technologies such as SIEM, IDS/IPS, and threat intelligence platforms. Furthermore, you will develop and implement strategic plans to enhance security posture, stay updated with the latest security trends, and collaborate with other departments to align security strategies with business objectives. As the primary point of contact for clients, you will manage security incidents and issues, provide regular reports on security status, and conduct security assessments and vulnerability scans. You will also be responsible for preparing and presenting regular reports on SOC activities, documenting security incidents and responses, and maintaining detailed records of security policies and procedures. To qualify for this role, you should have a Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field, with a master's degree preferred. You should also have proven experience in a SOC or similar role, experience in leading and managing a team of security professionals, and relevant certifications such as CISSP, CISM, or CEH. Proficiency in security tools and technologies, strong knowledge of network security, incident response, and threat analysis, and excellent leadership and communication skills are essential. The work environment for this role may include working in shifts, occasional travel for client meetings or industry conferences, and a hybrid working setup. NTT DATA is a trusted global innovator of business and technology services committed to helping clients innovate, optimize, and transform for long-term success. With a diverse team of experts and a focus on digital and AI solutions, NTT DATA is dedicated to creating a sustainable digital future for organizations and society.,
Posted 4 days ago
5.0 - 7.0 years
5 - 5 Lacs
Thiruvananthapuram
Work from Office
We are seeking an experienced and proactive SOC Lead to drive the operations of our Security Operations Center. The ideal candidate will have strong expertise in cybersecurity monitoring, incident response, threat hunting, and stakeholder communication. This role involves leading a global 24x7 SOC team, coordinating with cross-functional teams, and enhancing our threat detection and response capabilities. You will act as the escalation point for complex incidents and play a key role in process improvement, automation, and mentoring the SOC team. Key Responsibilities: Lead and coordinate the 24x7 SOC operations, managing a distributed team of L1 and L2 analysts. Provide advanced triage and investigation of escalated security s and incidents from L1 analysts. Act as the primary escalation contact for high-priority incidents and security breaches. Ensure timely incident response and resolution within SLA while maintaining high-quality ticket documentation. Conduct Root Cause Analysis (RCA) and create detailed incident reports for high-severity cases. Continuously review and fine-tune security s, rules, and thresholds across SIEM and other monitoring tools. Design and propose new security use cases and playbooks to improve detection and response automation. Conduct training sessions for the team on new tools, updated processes, and emerging threats. Organize and lead governance meetings (weekly/biweekly/monthly) with internal stakeholders and clients. Stay informed on the latest threat intelligence, vulnerabilities, and security technologies to proactively enhance SOC capabilities. Maintain and enhance SOC documentation, including SOPs, incident runbooks, and knowledge bases. Collaborate with engineering, infrastructure, and compliance teams to align incident response with organizational risk management practices. Required Skills & Experience: Minimum 4 years of hands-on experience in a Security Operations Center, focusing on incident response, security analysis, and threat hunting. Deep technical expertise in: Email Security (Mimecast) EDR Tools (e.g., Threat Down / Malwarebytes) Secure Web Gateway (Netskope SWG) Cloud Security (Microsoft Azure, Microsoft Defender) SIEM Platforms (Azure Sentinel preferred) Threat analysis and phishing investigation Sound understanding of cybersecurity frameworks (MITRE ATT&CK, NIST, etc.) and incident response lifecycle. Working knowledge of enterprise infrastructure: networking, firewalls, operating systems (Windows/Linux), databases, and web applications. Excellent written and verbal communication skills; able to convey technical details to non-technical stakeholders. Strong organizational and prioritization skills; experience handling multiple concurrent incidents and tasks in high-pressure environments Preferred Certifications: Relevant security certifications such as: CEH (Certified Ethical Hacker) Microsoft SC-200 (Security Operations Analyst) AZ-500 (Azure Security Engineer Associate) CISSP, GCIH, or similar. Proficiency with Security Tools: Mimecast Email Security Threat Down (Malwarebytes) Microsoft Azure, Microsoft Defender for O365 Netskope SWG Azure Sentinel (SIEM) Open-source tools for phishing analysis Required Skills Email Security, EDR, Threat hunting, SIEM
Posted 4 days ago
6.0 - 10.0 years
5 - 15 Lacs
Noida
Work from Office
Role & responsibilities • Security Incident monitoring & Security Incidents analysis. • Good experience in using SIEM tools. • Knowledge on Threat analysis, evolving Threat landscape. • Knowledge on Event logging and event analysis. • Knowledge on Corporate security products like firewalls, IPS, Web/content Filtering tools, Compliance tools, ITIL process. • Knowledge on Vulnerabilities and threats. • Knowledge on Packet Analysis and Forensic Analysis. • React to attacks observed during incidence monitoring. • Good knowledge about common security attacks, targeted attacks. • Define and act to common security incidents and reporting to stakeholders. • Contributing to continue monitoring and improvement of security posture of the organization.
Posted 4 days ago
3.0 - 5.0 years
1 - 6 Lacs
Noida
Work from Office
Good experience in SIEM tools, event logging and event analysis and experience in forensic analysis, Packet Analysis tools like Wireshark, TCP Dump etc. SIRT/SIEM/Threat Hunting Background/intel, netwitness, splunk, qRadar, RSA Netwitness, Linux/python understanding/Ethical hiking/programming background added advantage. Good knowledge in enterprise security products like SIEM tools, SOC, Security Incident Management, Threat Intel, Malware analysis, Firewalls, IPS, Web/content Filtering tools, AV, APT Tools, Wireshark, TCP Dump, Encase/Any other Forensic tool kit Very good understanding of security fundamentals and principles, attack techniques, Mitre, TTP, hacking tools etc Having experience of managing team of 24X7 team members across multiple locations. Red/Blue teaming activities Hands on experience on Threat Intel Management/Platform (TIM/TIP) Leveraging knowledge of the Cyber Kill Chain Framework and working familiarity of the MITRE ATT&CK Framework. Location: Noida. Must be willing to work in 24/7 shifts (including night shifts).
Posted 4 days ago
7.0 - 10.0 years
22 - 30 Lacs
Bengaluru
Work from Office
Skills SIEM tools (Splunk), SentinalOne, CASB tool (NetSkope), DLP OWASP, CWE, SANS, NISTGoogle, Microsoft, AWS scripting languages like Python, PowerShell security certifications (Security+, CEH, ECIH, GCIH Wireshark and packet sniffing tools (Java, Shell, JavaScript, Python threat analysis python cloud security software siem tools information security event log analysis adaptability siem planning scripting securitypeople management skill system java team work gcp leadership splunk logging aws programming communication skills architecture Education BE/B.Tech/MCA/M.Sc./M.Tech in Computer Science or related discipline Year of Experience: Minimum7 to 10 years of experience in the security domain with exposure to Security Products About the Team & Role: Position Overview: We are seeking a highly experienced and proactive Information Security Manager to lead our security initiatives. This role requires deep expertise in threat analysis, SIEM tools (Splunk, SentinelOne), and major security frameworks (OWASP, NIST). The ideal candidate will be responsible for identifying and mitigating technical risks, enhancing security tools, preparing intelligence reports, and providing technical leadership to a team. Candidates should have a minimum of 10 years in the security domain, strong experience with cloud security (Google, Microsoft, AWS), scripting (Python, PowerShell), and security event log analysis. Excellent communication and problem-solving skills are essential. Preferred qualifications include SIEM and vulnerability management experience, relevant security certifications (Security+, CEH, GCIH), and a Bachelor's degree in a related field. What will you get to do here? Initial point of contact for client requirements and operational escalation Proactively identify technical and architectural risks, and work effectively to mitigate them Research, plan, and implement new tool features to make security tools more effective and add value Prepare and present Security Intelligence Reports Provide technical direction to Associates and Analysts within the team Assist in investigations of high-level, complex violations of information security policies Report security performance against established security metrics Provide deep subject matter expertise in architecture, policy, and operational processes for threat analysis and client escalation Provide guidance and support to 3rd-level technical support, including architecture review, rules and policy review/tuning Establish and communicate extent of threats, business impacts, and advise on containment and remediation Collaborate with other BUs on security gaps and educate teams on cybersecurity importance Manage platforms and vendors What qualities are we looking for? Minimum 10 years of experience in the security domain with exposure to Security Products Experience with methodologies and tools for threat analysis of complex systems, such as threat modeling SME knowledge of SIEM tools (Splunk), SentinalOne, CASB tool (NetSkope), DLP, etc. Understanding of major security frameworks (OWASP, CWE, SANS, NIST, etc.) SME-level knowledge of the current threat landscape Experience securing applications deployed on cloud platforms (Google, Microsoft, AWS) Knowledge and experience with scripting languages like Python, PowerShell Experience with security operations program development Proficiency with security event log analysis and various event logging systems Excellent verbal and written communication skills Ability to learn and retain new skills in a changing technical environment Willingness to learn new technology platforms SIEM experience and Vulnerability Management Recognized network and security certifications (Security+, CEH, ECIH, GCIH, etc.) Experience with Wireshark and packet sniffing tools Python development experience Bachelor's degree in Computer Science, Engineering, or a related field Strong proficiency in programming languages (Java, Shell, JavaScript, Python) Excellent problem-solving skills and attention to detail Strong communication and teamwork abilities Expertise with privacy software
Posted 4 days ago
0.0 - 4.0 years
0 Lacs
noida, uttar pradesh
On-site
Are you our TYPE Monotype brings brands to life through type and technology that consumers engage with every day. The company's rich legacy includes a library that can be traced back hundreds of years, featuring famed typefaces like Helvetica, Futura, Times New Roman, and more. Monotype also provides a first-of-its-kind service that makes fonts more accessible for creative professionals to discover, license, and use in our increasingly digital world. Working with the biggest global brands and individual creatives, Monotype offers a wide set of solutions that make it easier for them to design beautiful brand experiences. Monotype Solutions India, a strategic center of excellence for Monotype, is a certified Great Place to Work three years in a row. The focus of this fast-growing center spans various areas such as Product Development, Product Management, Experience Design, User Research, Market Intelligence, Research in Artificial Intelligence and Machine learning, Innovation, Customer Success, Enterprise Business Solutions, and Sales. Headquartered in the Boston area of the United States and with offices across 4 continents, Monotype is the world's leading company in fonts. Monotype is looking to hire an Information Security Trainee to join its team. The selected candidate will be responsible for performing security investigations, coordinating breach response, and maintaining the security monitoring infrastructure. While experience is not mandatory, candidates with relevant experience in the role will be considered. The candidate will collaborate with internal Information Technology, Product Assurance, Engineering, and Tech Stack Vendors. Opportunity: - Analyze threat information from multiple sources and disciplines across the Intelligence Community. - Synthesize intelligence information and draw insights about possible implications. - Identify vulnerabilities and potential for exploitation in collected information. - Assess cyber criminals or foreign intelligence entities" capabilities and activities to support investigations or activities. - Respond to urgent situations to mitigate immediate and potential threats. - Investigate and analyze response activities. - Assist in malware remediation and configuration auditing of network and operating systems. Requirements: - Understanding of network, systems, application, and cloud security, particularly with AWS. - Knowledge of information security concepts. - Strong technical communication and analytical skills. - Excellent time management, organization, and creative problem-solving skills. - Effective oral and written communication, along with strong presentation skills. - Bachelor's degree in computer science/information technology/information security or equivalent. - Proficiency in one or more languages such as German, Japanese, French, or Spanish is desirable for this role. Monotype offers a dynamic global work environment with opportunities for growth and learning. Join us in our mission to bring brands to life through innovative type and technology solutions.,
Posted 4 days ago
1.0 - 3.0 years
2 - 6 Lacs
Pune
Work from Office
We are looking for a highly skilled and experienced Security Analyst I to join our team at SteerLean, an IT Services & Consulting company. The ideal candidate will have 1-3 years of experience in the field. Roles and Responsibility Conduct thorough risk assessments and vulnerability testing to identify potential security threats. Develop and implement comprehensive security strategies to mitigate identified risks. Collaborate with cross-functional teams to ensure seamless integration of security measures. Monitor and analyze security event logs to detect anomalies and respond promptly to incidents. Stay up-to-date with emerging trends and technologies in cybersecurity. Provide expert guidance on security best practices to internal stakeholders. Job Requirements Strong understanding of security principles, including threat analysis and risk management. Proficiency in security tools such as firewalls, intrusion detection systems, and antivirus software. Excellent analytical and problem-solving skills, with attention to detail and the ability to work under pressure. Effective communication and collaboration skills, with the ability to work with diverse teams. Ability to adapt to changing priorities and deadlines in a fast-paced environment. Strong knowledge of industry standards and regulations related to security, such as HIPAA or PCI-DSS.
Posted 5 days ago
4.0 - 8.0 years
13 - 17 Lacs
Noida
Work from Office
Roles and Responsibility Develop and implement comprehensive digital marketing strategies to achieve business objectives. Build and maintain strong relationships with clients and stakeholders to drive revenue growth. Collaborate with cross-functional teams to launch new products and services. Analyze market trends and competitor activity to identify opportunities and threats. Manage and optimize digital advertising campaigns across various platforms. Monitor and report on key performance indicators to measure campaign effectiveness. Job Requirements Proven track record of success in digital marketing or a related field. Strong understanding of digital media, advertising, and analytics. Excellent communication, project management, and leadership skills. Ability to work in a fast-paced environment and meet deadlines. Strong problem-solving and decision-making skills. Experience working with international clients or brands is an asset.
Posted 5 days ago
12.0 - 15.0 years
11 - 16 Lacs
Bengaluru
Work from Office
About The Role Job Title - Application security + Manager + Corporate Function Management Level :07 - Manager Location:Bangalore/ Hyderabad (Location flexible for right candidate) Must have skills: Application Security, Web application Scanning, API scanning, Mobile application scanning, SAST, DAST Strong understanding of threats, vulnerabilities, Risk prioritization, Application security design principles and best practices. Experience in designing and implementing Application security controls and frameworks. In-depth knowledge of security frameworks and standards (e.g., ISO 27001, NIST, OWASP). Hands-on experience with Application security tools and technologies. Good to have skills: Operations Management, Team Management, Invicti, HCL App Scan tool expertise. Job Summary : Applicant to manage the Infosec application scanning team of 25 team members and manage all business as usual activities and team operations along with the periodic reporting to senior management. Roles & Responsibilities: - Expected to be an SME in Application Security Technologies and tools (SAST, DAST, OWASP etc). -Lead and manage the Application security operations and initiatives for the team - Collaborate and manage the team to perform effectively. Responsible for team decisions and ensuring adherence to security best practices. Engage with multiple teams and contribute to key decisions. Expected to provide solutions to problems that apply across multiple teams. Ensure the implementation of robust applications security controls. Conduct risk assessments and vulnerability testing. Develop and maintain security policies and procedures. Professional & Technical Skills: As mentioned above in Must have and good to have skills section Additional Information: - The candidate should have minimum 12 years of experience in Application security, vulnerability management, experience in Application security tools and technologies. About Our Company | AccentureQualification Experience: Minimum 12 year(s) of experience is required Educational Qualification: B.Tech/BE or any graduate with 15 years full time education is required. (Accurate educational details should capture)
Posted 5 days ago
2.0 - 6.0 years
3 - 7 Lacs
Hyderabad
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Accenture MxDR Ops Security Threat Analysis Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply your security skills to design, build, and protect enterprise systems, applications, data, assets, and people. A typical day involves collaborating with various teams to implement security measures, conducting assessments to identify vulnerabilities, and ensuring that all systems are fortified against potential cyber threats. You will also engage in continuous learning to stay updated on the latest security trends and technologies, contributing to a safer digital environment for the organization. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular security assessments and audits to identify vulnerabilities.- Develop and implement security policies and procedures to safeguard information and assets. Professional & Technical Skills: - Must To Have Skills: Proficiency in Accenture MxDR Ops Security Threat Analysis.- Strong understanding of threat detection and incident response.- Experience with security information and event management tools.- Knowledge of network security protocols and best practices.- Familiarity with compliance standards and regulations related to cybersecurity. Additional Information:- The candidate should have minimum 2 years of experience in Accenture MxDR Ops Security Threat Analysis.- This position is based at our Hyderabad office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 5 days ago
4.0 - 8.0 years
4 - 7 Lacs
Pune
Work from Office
Responsibilities: * Conduct CCTV surveillance, site surveys & threat analyses * Manage security systems & operations * Prepare technical proposals & BOMs * Monitor RFID networks & CCTV feeds
Posted 5 days ago
1.0 - 5.0 years
0 Lacs
chennai, tamil nadu
On-site
Job Description: As a Security Analyst in our IT Services industry, you will be responsible for monitoring and analyzing security alerts generated by Securonix SIEM. Your role will involve performing initial triage of security incidents based on risk scores and behavioral analytics. In addition, you will escalate security incidents to L2 for deeper investigation and assist in fine-tuning Securonix correlation rules to reduce false positives. Documenting incidents, investigation steps, and outcomes in the incident management system will also be part of your daily tasks. Supporting phishing investigations and basic threat analysis, as well as following standard operating procedures (SOPs) for incident response, are crucial aspects of this role. To qualify for this position, you should hold a Bachelor's degree in Cybersecurity, IT, or a related field. Basic knowledge of SIEM and User Entity Behavior Analytics (UEBA) is required, along with an understanding of security frameworks such as NIST, SOC 2, and MITRE ATT&CK. Strong analytical skills, attention to detail, and certifications like Securonix Security Analyst, Security+, or Microsoft SC-900 are preferred. Join our team in Chennai, Tamil Nadu, India, where you will play a key role in maintaining the security posture of our organization. Note: This job is a full-time position with a salary of INR 600,000 per year.,
Posted 6 days ago
10.0 - 17.0 years
30 - 40 Lacs
Bengaluru
Hybrid
We are reaching out regarding an exciting opportunity in Cybersecurity Operations Leadership with a global organization known for innovation and resilience in cyber defense. In this role, you'll lead a 24x7 global Security Operations Center (SOC) and drive strategy and execution across threat detection, incident response, forensics, and automation using tools like Splunk, Phantom, CrowdStrike, and Tanium. Youll work closely with audit and compliance teams and ensure security operations are aligned with regulatory and industry best practices (NIST, MITRE ATT&CK, ISO 27001). Key Highlights: Lead SOC teams and security incident response globally Enhance SIEM/SOAR platforms, automate detection & response Hands-on experience with forensic tools, cloud security (AWS/Azure), and vulnerability management Strategic reporting, playbook creation, and regulatory compliance Preferred certifications: CISSP, CISM, GCIH, GCFA, CEH, or equivalent Experience: 10–15 years with at least 3–5 years in Cybersecurity Operations If you’re passionate about building world-class cybersecurity defense mechanisms and enjoy leading high-performing teams, we’d love to speak with you!
Posted 1 week ago
2.0 - 5.0 years
5 - 8 Lacs
Noida
Work from Office
Develop and implement organization-wide information security policies and practices Monitor IT infrastructure for security incidents and lead the incident response process Conduct regular risk assessments, vulnerability scans, and audits Ensure compliance with relevant standards and regulations (e.g., ISO 27001, SOC 2, GDPR, PCI-DSS) Manage the deployment and monitoring of security tools (firewalls, SIEM, DLP, IDS/IPS, endpoint protection) Coordinate with internal teams and third-party vendors to ensure secure systems and operations Lead and guide the security awareness and training program across departments Handle internal and external security audits, and ensure timely closure of findings Stay updated with emerging threats, security trends, and regulatory changes Collaborate with the IT, DevOps, and legal teams to ensure secure development and compliance
Posted 1 week ago
8.0 - 12.0 years
20 - 27 Lacs
Ahmedabad
Work from Office
We are seeking a highly skilled Cybersecurity Officer with a strong background in information security, cyber risk management, and technical infrastructure protection.As a global provider of financial and data clearing applications for mobile network operators, we understand the critical importance of robust cybersecurity measures.This role is specifically focused on the digital security of enterprise systems, cloud infrastructure, application environments, and customer data. Nextgen Clearing is the market leading provider of global roaming services. We operate internationally across 20 global locations, employing over 300 talented people. We offer Award-winning Data and Financial Clearing services, along with unique value-added features on a single flexible online platform. Nextgen Clearing serves more than 160 operators worldwide, giving them a 24/7 holistic overview of their full roaming business Key Responsibilities: Define and implement security policies and controls to protect the company's digital assets and ensure regulatory compliance. Continuously monitor the company's security posture and quickly respond to security incidents. Develop security strategies and plans for preventing and responding to security breaches. Provide expert guidance and support to software teams on implementing secure development practices, security requirements, and conducting security testing. Foster secure application deployment and configuration, ensuring the protection of data integrity and confidentiality. Conduct regular training and awareness sessions for the company's staff to promote security best practices. Assist in the response to security incidents, including the management of communications and recovery efforts. Work collaboratively with customer service teams to safeguard customer data, enhance data privacy, and ensure secure customer interactions. Contribute to the company's efforts to prevent fraud and manage security incident communications to maintain trust with customers. Stay up-to-date on the latest cybersecurity trends, threats, and security technologies to continuously improve the organization's security stance. Collaborate with IT and other departments to establish a security-focused culture across the company. Develop and maintain documentation related to security policies, procedures, and incident response plans. Stay up to date on emerging cybersecurity threats and vulnerabilities and proactively recommend and implement countermeasures to mitigate risks. Foster security awareness and monitor security policy implementation Requirements Bachelor's degree in Computer Science, Information Security, or a related field. Master's degree or cybersecurity certifications (e.g., CISSP, CISM, CEH, TOGAF) are a plus. A minimum of 5 years of experience in information security or cybersecurity. Strong understanding of information security principles, best practices, and industry standards. Experience with implementing and managing security protocols, cybersecurity tools, and technologies. Familiarity with compliance requirements and standards such as ISO 27001, GDPR, and PCI DSS. Ability to identify security vulnerabilities and risks, as well as implement preventive and corrective measures. Knowledge of secure software development life cycle (SDLC) practices. Excellent problem-solving skills and the ability to work in a fast-paced, high-pressure environment. Strong communication and interpersonal skills to collaborate with diverse teams and educate non-technical stakeholders on security-related matters. Incident response and crisis management experience. Working Conditions: The role may require availability outside of standard business hours to respond to security incidents and maintain critical security measures. Benefits A supportive, dynamic, and collaborative work environment. Exceptional opportunities for professional and career advancement. Engagement with the leading provider of roaming services, catering to global Mobile Network Operators as clients. For more information, please visit www.nextgenclearing.com. Private Health Insurance Training & Development
Posted 1 week ago
8.0 - 13.0 years
5 - 12 Lacs
Bengaluru
Hybrid
About the Role: Minimum experience of 8 years in the field of Threats and Vulnerability management in a corporate environment This is a HANDS-ON engineering position for individuals with a passion for Vulnerability Management, managing related tools and supporting business. The role is 70% focused on providing operations support and 30% focused on new projects, enhancements. Hybrid working model is available. Role & Responsibilities: Manage Qualys console using various modules. Make sure client agent coverage is managed at a good level. Support business with Qualys and/or Vulnerability Management requests Understand the current state of the technology components in the IT stack ranging from networking, storage, compute (virtualization, containers), applications & security mgmt. Collaborate with team-mates and understand the threats, vulnerabilities, and risks to the enterprise. Establish non-production and production environments for testing and hosting the applications. Own the end-to-end technical design, unit testing and the maintenance of the hosting environment. Adhere to the Scaled Agile Framework methodologies and tools that exists in the environment. Participate in daily stand-up sessions of Compliance & Security release train and contribute to bi-weekly sprints. Learn System Engineering concepts to analyse existing environment and find more efficient ways. Identify ways of doing things with full automation, AI and ML which needs knowing/learning the concepts of these technologies. If interested please do share your updated profile to archana.r@bahwancybertek.com
Posted 1 week ago
3.0 - 8.0 years
3 - 12 Lacs
Chennai
Work from Office
Responsibilities: * Conduct threat analysis using SOC tools like QRadar & LogRhythm. * Collaborate with incident response team on security incidents. * Monitor network activity for suspicious behavior.
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
The role of an Application (software) Security Engineer is an entry-level, hands-on, engineering-focused position with the responsibility of fostering a Secure SDLC and secure by design approach and practice across all software engineering teams. You must possess a good combination of problem-solving and communication skills to effectively support the Application Security, InfoSec, and Software engineering teams. Your main responsibilities will include configuring and fine-tuning Application Security tests and vulnerability scans, integrating security testing into CI/CD pipelines, and collaborating with Senior Application Security engineers on Penetration tests set up and validation. Additionally, you will be expected to document and update processes and procedures, conduct research and consultations with colleagues, deliver secure software development training such as OWASP Top10, and collaborate with Security Analysts on software vulnerabilities and security issues. This will involve determining scope, severity, and potential impact of security issues, recommending next steps, and following through with risk treatment and mitigation. You will also be required to appropriately escalate issues to various teams and levels of authority within the organization. To qualify for this role, you must have a Bachelor's degree in a relevant business or technical discipline, along with a minimum of 3 years of relevant work experience. Demonstrated knowledge of application security concepts, best practices, and methods is essential, as well as experience with various application security tools including SAST, SCA, and DAST. Experience with Web Application security testing like Web Pentesting, Fuzzing, and Automated tests is also required. Ideally, you will also have experience securing cloud infrastructure and cloud applications, working knowledge of various architectures and design patterns, ability to code in at least one programming language (such as python, javascript, or go), familiarity with AWS native security tools, and knowledge of current and emerging security technologies and threats. Experience with threat analysis methodologies and tools, developer tools, project management, bug tracking systems, and integrating security tools into CI/CD pipelines would be considered advantageous for this role. This is a challenging yet rewarding opportunity for an individual with a passion for application security and a drive to contribute to the implementation of secure software practices within a dynamic organization.,
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
ludhiana, punjab
On-site
You will be responsible for delivering high-quality cybersecurity training sessions to individuals at various skill levels. Your role will involve preparing and presenting training materials, conducting hands-on labs, and providing ongoing support to ensure the success of our cybersecurity training programs. Key Responsibilities: - Develop, design, and deliver engaging cybersecurity training programs on various topics including network security, threat analysis, ethical hacking, risk management, data protection, and compliance. - Conduct theoretical and hands-on sessions using real-world examples and case studies to reinforce key concepts. - Evaluate the effectiveness of training programs and make improvements based on feedback. - Stay updated with the latest trends, threats, and best practices in the cybersecurity field to ensure training content is current. - Provide guidance and mentoring to participants, answering questions and offering solutions to cybersecurity challenges. - Develop training materials such as presentations, manuals, and lab exercises. - Administer exams or certifications to assess participants" understanding of the material. - Customize training solutions based on client or organizational needs. - Assist in creating documentation and resources for post-training reference. Qualifications: - Proven experience as a Cybersecurity professional with hands-on experience. - In-depth knowledge of cybersecurity principles, threat vectors, firewalls, encryption, vulnerability assessments, and incident response. - Relevant cybersecurity certifications such as CISSP, CEH, CISM, CompTIA Security+, or similar. - Prior experience in teaching or training, with the ability to explain complex technical concepts in an accessible manner. - Strong communication and presentation skills, with the ability to engage and motivate participants. - Ability to design and develop comprehensive training curricula. - Familiarity with various cybersecurity tools and technologies such as SIEM, penetration testing tools, firewalls, and antivirus software. - Experience with online learning platforms and delivering virtual training is a plus. - Strong problem-solving abilities and the capability to adapt to new challenges. Preferred Qualifications: - Bachelor's degree in Cybersecurity, Information Technology, or a related field. - Experience in corporate or enterprise-level cybersecurity training. - Knowledge of regulatory frameworks (e.g., GDPR, HIPAA, NIST) and compliance standards. - Experience with security certifications like CompTIA Network+, Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM). This is a full-time, permanent position with a day shift schedule at an in-person work location.,
Posted 1 week ago
15.0 - 20.0 years
13 - 17 Lacs
Gurugram
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Infrastructure Security Vulnerability Management Operations Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :Create asset list and prioritize assets, conduct regular vulnerability assessments based on the Tenable tool, identify security weaknesses in systems and applications, work with peer teams till closure of the Vulns, track patching as per proposed timelines. Roles & Responsibilities:- Create correct asset list-Perform Vuln assessment-Relevant request to be raised thorough SNow.-Highlighting issues with the Scanned report to Product team and resolve it immediately. If issue not getting resolved, then escalate it to right stakeholder.-Analyse scan results and generate comprehensive reports detailing vulnerabilities, potential impacts, and remediation recommendations/Action plan with dates.-Collaborate with IT, Partner, Business and Security teams to prioritize and address identified vulnerabilities based on risk assessments and business impact.-Monitor and track remediation efforts on weekly / monthly basis to ensure vulnerabilities are resolved within defined timelines.-Maintain and update documentation related to vulnerability management processes, policies, and procedures.-Stay current with industry trends, threats, and vulnerabilities to provide informed recommendations and enhancements to the policies, and procedures Professional & Technical Skills: -Familiarity with vulnerability scanning tools, particularly Tenable and Snow.-Understanding of security frameworks and standards (e.g., NIST, ISO 27001).-Strong analytical and problem-solving skills with attention to detail.-Relevant certifications (e.g., Vulnerability Management, Certified Ethical Hacker (CEH), or similar) are a plus.-To succeed in this role, you should have the following skills and experience-Experience in vulnerability management or security operations. Additional Information:- The candidate should have minimum 5 years of experience in Infrastructure Security Vulnerability Management Operations.- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 week ago
15.0 - 20.0 years
13 - 17 Lacs
Gurugram
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Solution Development Good to have skills : NAMinimum 15 year(s) of experience is required Educational Qualification : 15 years full time educationAs a Security Solution Architect, candidate would be primarily responsible for solution architecture effort on deals that are large and complex and own all components of complex deals. Lead or work as Lead Solution Architect on complex and bundled deals and independently can come up with the solution. Conduct solution reviews with SMEs and the DCSO approver. Attend calls with the client team to understand the requirement. Can be able to bring value and differentiated solutions. Work on building the cost model for the solution. Roles & ResponsibilitiesShould be able to lead the joint solutioning workshops with client and be able to walk through technical security solutions with the clients during Orals. Should possess excellent stakeholder management skills and be good to work as individual contributor and good team player. When assigned responsibilities to lead the team, candidate should show leadership qualities to manage the team and get the work done. Frequently interacts with senior client leadership. Develop statement of work Performs Peer Reviews Assists in performing QA Frequently sells to senior client leadership Leads negotiations or develop business terms and conditions Leads QA or plays major QA role for largest, most complex deals Has led solution development for multiple deal types Work with delivery leads for the approval of solution/efforts Bring out technical differentiators and value in the solution Able to represent the solution in front of the client leadership team. Professional & Technical Skills: Prior experience at least 5 years in leading solution development in a reputed organization Deep knowledge and experience in Cyber security Infra Sec, App Sec, Threat and Vulnerability Management and Identity Access Management is necessary Should be a good presenter Should have leadership qualities Should keep himself/herself up to date on various SA Cost models and processes, work independently to develop IDL files Good communication and collaboration skills Prior experience in leading solution development will be an advantage Experience in leading delivery and solution planning of large, complex deals at least 5 opportunities with Security TCV of greater than10m in the recent experience Comfortable in using relevant tools and estimators Comfortable working in extended working hours Good to have CISSP, CISM, CISA Cloud Security knowledge and certification AWS, Azure Solution Architect Core Training Good to have Solution Architect Advance Training Additional InformationMinimum 15- year full time education with Bachelor or college degree in related field or equivalent work experience The candidate should have minimum 15 years of experience This position is based at our Gurugram office. Qualification 15 years full time education
Posted 1 week ago
7.0 - 12.0 years
20 - 25 Lacs
Chennai
Work from Office
Dear Cybersecurity Professionals, We are thrilled to invite you to our upcoming AI in Cybersecurity User Group activity , happening on 26th July in Chennai . This is an excellent opportunity to connect, learn, and exchange insights on how AI is revolutionizing the cybersecurity landscape. Highlights of the event: Expert talks on AI-driven cybersecurity solutions Real-world case studies and practical insights Networking with industry peers and thought leaders Interactive sessions to discuss challenges & best practices Please note: Seats are strictly limited , and registrations will be accepted on a first-come, first-served basis. Date: 26th July 2025 Time: 10:30 AM 12:30 PM Location: Chennai (venue details will be shared upon confirmation) If youre interested in joining, please reply to this email or register through below link at the earliest to secure your spot. https://forms.cloud.microsoft/r/Qc57BKrBmQ Looking forward to your participation in building a vibrant AI in cybersecurity community!
Posted 1 week ago
5.0 - 10.0 years
0 - 0 Lacs
Pune
Work from Office
Evaluate alerts, evidence, and indicators from all relevant source (network, endpoint, SIEM, local logs, etc. ) to successfully triage, scope, and evaluate threats. • Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and implement rapid containment controls. • Collects and preserves digital evidence in an appropriate manner for the threat (up to and including a forensically sound manner according to best practices) • Evaluates artifacts (processes, services, drivers, libraries, binaries, scripts, memory, network traffic, file, email, and other objects) for malicious activity, exploitation, and/or unauthorized access • Identifies attack vectors, exploit methods, malicious code, C2 activity, and persistence mechanism • Performs analysis to determine full scope, risk, and impact of breach or exposure • Performs root cause analysis and recommend mitigation strategies • Properly and thoroughly document incident findings, evidence, analysis steps, and create status updates, findings reports, and recommendations • Focus on preserving uptime and minimize the impact on business and medical services • Collaborate with other teams to perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks. • Employ approved defence-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness). • Collect and analyze intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise. • Coordinate with intelligence analysts to correlate threat assessment data. • Write, publish, and socialize after action reports and presentations. • Determine the extent of threats and recommend mitigation and/or remediation courses of action or countermeasures to manage risks.
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough