Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
4.0 - 6.0 years
0 Lacs
bengaluru, karnataka, india
On-site
About this role: Wells Fargo is seeking a Information Security Engineering Manager. In this role, you will: Manage a team of engineers that design, document, test, maintain and provide issue resolution recommendations for highly complex security solutions related to networking, cryptography, cloud, authentication or directory services, email, internet, applications or endpoint security Manage security consulting on large projects for internal clients to ensure conformity with corporate information security policy, and standards Possess subject matter expertise at a mastery level in current and emerging security solutions and best practices Review and correlate security logs Manage computer security incident response activities for highly complex events Conduct technical investigation of security-related incidents, and conduct post-incident digital forensics to identify causes and recommend future mitigation strategies Manage implementation of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity Work with more experienced technologists and team Interface with more experienced management Manage allocation of people and financial resources for Information Security Architecture Mentor and guide talent development of direct reports and assist in hiring talent Required Qualifications: 4+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education 2+ years of Leadership experience Desired Qualifications: 4+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education 2+ years of Leadership experience in product development and Information Security teams Expertise in secure coding standards and agile secure SDLC and deep knowledge of EPL integration Well versed with application security vulnerabilities (OWASP) and remediation strategies. Bachelor's and/or master's degree in computer science or information Systems One or more professional certifications like CSSLP (Certified Secure Systems Lifecycle Professional), CISM or CISSP Superior attention to detail with excellent written and verbal communication skills. Strong understanding of intersection of Application Security domain and the latest development trends in API, Container and Cloud technologies. Comfortable with making and presenting recommendations to a wide audience of stakeholders. Stay informed and educated on current and potential security threats and attacks. Demonstrated experience of communicating secure development concepts to non-technical audiences and the ability to achieve results through prolific communication skills. Demonstrated knowledge on Information Security related requirements in applications, secure development standards, and Best Practices. Demonstrated ability in publishing secure coding standards. Experience in Collaborating with cross functional teams to achieve results. Demonstrated experience in stakeholder management. Demonstrated experience of conflict resolution, negotiation and problem identification and solving skills. Superior Knowledge of AppSec security products. Posting End Date: 28 Aug 2025 We Value Equal Opportunity Wells Fargo is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other legally protected characteristic. Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit's risk appetite and all risk and compliance program requirements. Candidates applying to job openings posted in Canada: Applications for employment are encouraged from all qualified candidates, including women, persons with disabilities, aboriginal peoples and visible minorities. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process. Applicants with Disabilities To request a medical accommodation during the application or interview process, visit . Drug and Alcohol Policy Wells Fargo maintains a drug free workplace. Please see our to learn more. Wells Fargo Recruitment and Hiring Requirements: a. Third-Party recordings are prohibited unless authorized by Wells Fargo. b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.
Posted 1 week ago
4.0 - 6.0 years
0 Lacs
bengaluru, karnataka, india
On-site
About this role: Wells Fargo is seeking a Senior Information Security Engineer. Wells Fargo's Cyber Threat Management: Strategic Intelligence & Outreach (SIO) team develops and maintains key relationships through engagements with private and public sector organizations by enhancing the cyber defense posture of Wells Fargo to remain at the forefront of strategic intelligence. Our mission is to conduct Cyber Intelligence outreach with entities external to Wells Fargo for the purposes of information sharing, fostering cyber community relations, and Peer-to-Peer incident management during cyber events. Strategic Intelligence & Outreach (SIO) and Threat Management Analytics Develop and maintain key relationships, through engagements with private and public sector organizations, in order to enhance the cyber defense posture of Wells Fargo and remain at the forefront of strategic intelligence In this role, you will: Lead or participate in computer security incident response activities for moderately complex events Conduct technical investigation of security related incidents and post incidents digital forensics to identify causes and recommend future mitigation strategies Provide security consulting on medium projects for internal clients to ensure conformity with corporate information, security policy, and standards Design, document, test, maintain, and provide issue resolution recommendations for moderately complex security solutions related to networking, cryptography, cloud, authentication and directory services, email, internet, applications, and endpoint security Review and correlate security logs Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity Identify security vulnerabilities and issues, perform risk assessments, and evaluate remediation alternatives Collaborate and consult with peers, colleagues and managers to resolve issues and achieve goals Required Qualifications: 4+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education Desired Qualifications: Strong years of experience in one or a combination of the following: Project management, implementation, Cyber Threat Intelligence, or Network Engineering/Analyst Extensive understanding with regard to process development Background in Metrics analytics Proficient in defining, documenting, managing & enhancing Cyber Threat Intelligence processes Understanding of NIST framework (National Institute of Standards and Technology) Strong years of Threat Modeling Involvement with FS-ISAC (Financial Services - Information Sharing & Analysis Center) or other financial intelligence sector partners Ability to swiftly analyze Cyber Intelligence and disseminate to leadership for immediate action. Ability to articulate and present written summaries to key stakeholders and leadership Bachelor's degrees in cyber security Job Expectations: In person attendance to required partner meetings in regional field locations Lead complex initiatives with broad impact and act as key participant in large scale planning Provide principal level strategic intelligence consulting services to client organizations Represent Wells Fargo on Industry boards and committees to acquire a wide spectrum of Cyber Intelligence Review and analyze complex larger-scale or longer-term challenges that require in-depth evaluation of multiple factors including intangibles or unprecedented cyber factors Identify strategic business investments and alliance opportunities Make decisions in complex situations that influence and lead the broader work team to meet deliverables and drive new initiatives Provide guidance to less experienced staff Evaluate and approve process of identified opportunities Provide technical expertise in identifying, evaluating, and developing systems and procedures that are cost effective and meet business requirements. Apply knowledge of industry trends and technology to drive organizational change and position Wells Fargo for the future. Works with user groups to provide training, resolve questions, assess user needs, and recommend changes. Participates in transforming strategic enterprise architecture and design principles into specific system requirements and specifications Posting End Date: 31 Aug 2025 We Value Equal Opportunity Wells Fargo is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other legally protected characteristic. Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit's risk appetite and all risk and compliance program requirements. Candidates applying to job openings posted in Canada: Applications for employment are encouraged from all qualified candidates, including women, persons with disabilities, aboriginal peoples and visible minorities. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process. Applicants with Disabilities To request a medical accommodation during the application or interview process, visit . Drug and Alcohol Policy Wells Fargo maintains a drug free workplace. Please see our to learn more. Wells Fargo Recruitment and Hiring Requirements: a. Third-Party recordings are prohibited unless authorized by Wells Fargo. b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
karnataka
On-site
You will be joining as a Cyber Security Senior Analyst specializing in Qualys Vulnerability Management with over 5 years of experience in operational risk management. In this role, you will be supporting the Security Operations Center (SOC) team in their daily activities and overseeing Operational Security Processes. Your responsibilities will include having a comprehensive understanding of Vulnerability management, encompassing tasks such as scanning, follow-up on remediation, and verifying false positives. You will be conducting Network and System Vulnerability assessments and meticulously documenting corrective actions. Your role will involve managing the end-to-end vulnerability lifecycle, starting from the discovery of vulnerabilities to their closure. It will be crucial for you to identify both internal and external threats that may lead to unauthorized disclosure, misuse, alteration, or destruction of customer information assets. As part of your duties, you will be required to identify and prioritize vulnerabilities in client environments and deliver timely vulnerability assessment reports to key stakeholders. Additionally, you will be responsible for ensuring prompt follow-up with patch management and coordinating vulnerability remediation with Countermeasures personnel. Moreover, you will be actively involved in identifying areas for process improvements and documenting them clearly for future reference. Your primary focus will be on overseeing the vulnerability scan process, which is primarily based on Qualys Tools. Overall, your expertise and experience in operational risk management will be invaluable in supporting the SOC team and ensuring the effective management of Vulnerability Management processes.,
Posted 1 week ago
2.0 - 6.0 years
0 Lacs
hyderabad, telangana
On-site
You will be working as an Android Malware Analyst and your main responsibilities will include performing security assessments, design reviews, and threat modeling. You should have a Bachelor's degree in Computer Science or a related technical field, along with at least 2-3 years of experience in security assessments, security design reviews, or threat modeling. Additionally, you should be proficient in malware analysis, reverse engineering, and software development. Preferred qualifications for this role include expertise in threat identification, Android reverse engineering, understanding of ARM-based architecture, and experience in Android application development using C/C++ and Java. You should also have a strong technical knowledge of security engineering, computer and network security, authentication, security protocols, and applied cryptography. Experience with automation and scripting, particularly in Python, is desired. As an Android Malware Analyst, your responsibilities will involve performing initial triage and security analysis of a large number of Android applications, conducting reverse engineering, analyzing malware, documenting analysis findings accurately for reporting purposes, advocating for security best practices and secure coding, and researching potential attack vectors against Android. You will also collaborate with team members to enhance Android Security and Privacy's understanding of malware and propose methods for detection and mitigation.,
Posted 1 week ago
2.0 - 6.0 years
0 Lacs
hyderabad, telangana
On-site
You will be responsible for conducting security assessments, security design reviews, and threat modeling with a focus on Android malware analysis. You should have a Bachelor's degree in computer science or a related technical field, along with at least 3 years of experience in security assessments, security design reviews, or threat modeling. Your expertise should include malware analysis, reverse engineering, and software development. Preferred qualifications include the ability to identify threats accurately, especially malicious code, and classify all categories of malicious applications. You should have experience in Android reverse engineering (APK, DEX), malware analysis, and threat modeling, along with an understanding of ARM-based architecture. Additionally, Android application development experience in C/C++ and Java is preferred. You should have experience in analyzing app behavior using automated tools and sandbox environments to detect known malicious patterns. A strong technical knowledge of security engineering, computer and network security, authentication, security protocols, and applied cryptography is required. Experience with automation and scripting, particularly in Python, is beneficial. You should also be able to classify applications based on predefined Standard Operating Procedures (SOPs) and known threat indicators. As an Android Malware Analyst, your responsibilities will include performing triage and security analysis of a high volume of Android applications, conducting reverse engineering, and analyzing malware at scale. You will be expected to accurately and concisely document all analysis findings for reporting purposes, advocate for security best practices and secure coding, and conduct research to identify potential attack vectors against Android. Collaboration with team members to enhance Android Security and Privacy's understanding of malware and propose methods for detection and mitigation will also be part of your role.,
Posted 1 week ago
2.0 - 4.0 years
0 Lacs
mumbai, maharashtra, india
On-site
At a Glance: The Story Behind AMINA Founded in April 2018 and headquartered in Zug, AMINA Bank is a pioneer in the financial industry providing a seamless, secure and easy-to-use bridge between digital and traditional assets. As a smart bank AMINA Bank offers a fully universal suite of regulated banking services in the emerging digital economy. In August 2019, AMINA Bank received a Swiss banking and securities dealer license the first time a reputed, regulatory authority such as FINMA has granted a licence to a financial services provider with a core capability in digital assets. The broad, vertically integrated spectrum of services combined with the highest security standards, make AMINA Banks value proposition unique. CVVC Global Report and CB Insights names AMINA Bank as Top 50 Companies within the blockchain ecosystem. Your Mission (Should You Choose to Accept It) Were looking for a talented and dynamic individual, who is self-motivated and loves finding optimal operational results to join us as a SOC Analyst and Incident Responder to protect our enterprise infrastructure against cyber threats. Your AMINA To-Do List Security Monitoring and Triage: Handle initial monitoring and triaging alerts, conduct deeper investigations into escalated incidents, and manage complex threats. You will be responsible for responding to basic incidents, escalating issues as needed, and performing advanced analysis to resolve issues that Tier 1 analysts cannot handle. Incident Response: Lead response efforts for major incidents such as ransomware and data breaches. Coordinate containment and eradication with IT-Ops and IT-Security teams, develop and execute recovery plans post-incident, conduct root cause analysis, and document lessons learned. You will also brief leadership on incident status and impact. Threat Hunting and Intelligence: Proactively search for hidden threats or anomalies, gather and analyze threat intelligence, and produce actionable threat reports and briefings. Collaborate with Threat Intelligence Analysts to prioritize hunting efforts and refine detection logic. Forensic Analysis: Conduct detailed investigations into security breaches to support recovery and legal efforts. Collect and preserve digital evidence, analyze malware, logs, and memory dumps for attack details, and prepare forensic reports for legal or compliance use. Malware Analysis: Specialize in dissecting and understanding malicious software. Reverse-engineer malware samples, identify and document IOCs and behaviors, assist in developing detection signatures, and support incident response with malware insights. Your Golden Ticket To The AMINA Team Bachelors degree in Computer Science, Information Security, Cybersecurity, or a related field. Minimum of 2 years in security analysis and incident response, with proficiency in tools such as SIEM, XDR, and IR platforms. Proven experience in handling major security incidents, conducting threat hunting, and performing forensic analysis. Experience in cloud security, network security, and application security is highly desirable. Familiarity with detection engineering and API security is a plus. Advanced proficiency in log and event analysis, threat identification, and mitigation. Strong analytical and problem-solving abilities. Excellent written and oral communication skills, with a knack for collaboration. Proficiency in English, both written and spoken, with good presentation skills. Ability to work independently and as part of a team. Relevant certifications such as CISSP, CEH, OSCP, GCIH, GCIA, Microsoft Certified: Azure Security Engineer, or equivalent. Understanding of ITIL and ITSM processes, and strong understanding of IT-Security Detection & Response principles and practices. Proactive with a continuous improvement approach, staying updated on emerging security threats and technologies. Why Were Awesome Join our skilled team and together redefine finance. We owe our exponential growth to our innovative and collaborate team spirit and talented workforce. Every voice counts as we are always committed to learning from diverse perspectives and backgrounds because our people make the difference at AMINA Bank. Regardless of your age, gender, belief, and background, at AMINA EVERYONE (E) is welcome! Show more Show less
Posted 1 week ago
1.0 - 6.0 years
3 - 6 Lacs
pune, maharashtra, india
On-site
Roles and Responsibility Conduct thorough risk assessments to identify potential threats to the organization. Develop and implement effective risk management strategies to mitigate identified risks. Collaborate with cross-functional teams to ensure compliance with regulatory requirements. Analyze market trends and competitor activity to inform risk management decisions. Provide expert guidance on risk management best practices to stakeholders. Monitor and report on key performance indicators related to risk management. Job Requirements Strong understanding of risk management principles and practices. Excellent analytical and problem-solving skills. Ability to work effectively in a fast-paced environment. Strong communication and interpersonal skills. Experience working with financial institutions or similar organizations. Familiarity with regulatory requirements and industry standards. Competitive salary and benefits will be offered to the right candidate.
Posted 2 weeks ago
10.0 - 17.0 years
30 - 35 Lacs
Goregaon
Work from Office
Looking for someone who has strong hands-on experience on Security Incident Response,Vulnerability Management,Security tool operation, Threat and Vulnerability Identification. Must have relevant experiencewith design, implementation,management
Posted 1 month ago
10.0 - 17.0 years
30 - 35 Lacs
Thane
Work from Office
Looking for someone who has strong hands-on experience on Security Incident Response,Vulnerability Management,Security tool operation, Threat and Vulnerability Identification. Must have relevant experiencewith design, implementation,management
Posted 1 month ago
10.0 - 17.0 years
30 - 35 Lacs
Mumbai Suburban
Work from Office
Security Lead For one of the data center hybrid & IT Soln Provider Looking for someone who has strong hands-on experience on Security Incident Response,Vulnerability Management,Security tool operation, Threat and Vulnerability Identification. Must have relevant experiencewith design, implementation,management
Posted 1 month ago
10.0 - 17.0 years
30 - 35 Lacs
Ratnagiri
Work from Office
Security Lead For one of the data center hybrid & IT Soln Provider Looking for someone who has strong hands-on experience on Security Incident Response,Vulnerability Management,Security tool operation, Threat and Vulnerability Identification. Must have relevant experiencewith design, implementation,management
Posted 1 month ago
5.0 - 9.0 years
0 Lacs
karnataka
On-site
As a Regional Information Security Officer (RISO) at SAP in Germany, your role will be crucial in maintaining our system security posture and safeguarding our customer's data from unauthorized use. You will play a vital part in risk management by protecting our systems, identifying threats and vulnerabilities, and ensuring security compliance through mitigation and remediation efforts. Collaboration with the Business Information Security Officer for the Soveregin Services organization will be essential to customize the central security framework, address India's regulatory requirements, and implement an information security framework accordingly. Your responsibilities will include: - Demonstrating a commitment to maintaining office presence to facilitate efficient team collaboration. Joining the SAP Sovereign Cloud Delivery India unit will involve contributing to the provision of SAP's Sovereign Cloud Services in India. Your focus will be on cloud landscape architecture design, construction, maintenance, and operation to deliver stable, secure, and resilient cloud services that align with local laws, regulations, and India's unique security and digital sovereignty needs. You will collaborate closely with the central Architecture team, Security Office, Engineering teams, and Regulatory and Governance teams in India. At SAP, we are dedicated to helping our over four hundred thousand global customers work together more efficiently and leverage business insights more effectively. With a rich history in enterprise resource planning (ERP) software, we have evolved into a market leader in end-to-end business application software, database services, analytics, intelligent technologies, and experience management. Our cloud-based company, with over two hundred million users and a hundred thousand employees worldwide, is driven by purpose and future-oriented, emphasizing teamwork and personal growth. We believe in connecting industries, people, and platforms to provide tailored solutions for every challenge. Our culture at SAP is rooted in inclusion, well-being, and flexible working models to ensure that everyone, regardless of background, feels valued and empowered to perform at their best. We celebrate the unique capabilities and qualities each individual brings to our company, investing in our employees to foster confidence and unleash their full potential. As advocates of diversity and equality, we strive to create a fairer and more inclusive world by unleashing all talents and promoting equity. SAP is a proud advocate of equal opportunity and affirmative action, committed to Equal Employment Opportunity values. We offer accessibility accommodations to applicants with physical or mental disabilities and encourage individuals to request assistance or accommodation by contacting our Recruiting Operations Team at Careers@sap.com. For existing SAP employees, please note that only permanent roles are eligible for the SAP Employee Referral Program, subject to the eligibility rules outlined in the SAP Referral Policy. Specific conditions may apply to roles in Vocational Training. We believe that a diverse and inclusive workforce is essential for our success, and we are dedicated to providing a workplace where everyone can thrive and contribute their best. As a potential candidate, you may be required to undergo a background verification process conducted by an external vendor to ensure a safe and secure work environment. Requisition ID: 431367 | Work Area: Software-Development Operations | Expected Travel: 0 - 10% | Career Status: Professional | Employment Type: Regular Full Time | Additional Locations: #LI-Hybrid. Job Segment: Information Security, Cloud, ERP, Compliance, Computer Science, Technology, Legal,
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
As an Information System Security Engineer (ISSE) at SAP, you will play a vital role in maintaining our system security posture and safeguarding our customer's data from unauthorized use. Your primary responsibility will involve risk management to ensure the protection of our systems, identification of threats and vulnerabilities, as well as the mitigation and remediation of vulnerabilities to uphold security compliance standards. In this role, you will collaborate with a dedicated team at SAP Sovereign Cloud Delivery India unit, which is responsible for providing SAP's Sovereign Cloud Services in India. Together, you will work on cloud landscape architecture design, construction, maintenance, and operation to deliver stable, secure, and resilient cloud services that are fully compliant with local laws, regulations, and the specific security, secrecy, and digital sovereignty requirements of India. Your team will closely collaborate with the central Architecture team, Security Office, Engineering teams, and Regulatory and Governance teams in India. At SAP, we are committed to fostering a culture of inclusion, prioritizing health and well-being, and offering flexible working models to ensure that everyone, regardless of their background, feels included and empowered to perform at their best. Our belief in diversity and inclusion drives us to invest in our employees, helping them unlock their full potential and contribute to creating a better and more equitable world. SAP is dedicated to being an equal opportunity workplace and an affirmative action employer, upholding the principles of Equal Employment Opportunity. We provide accessibility accommodations for applicants with physical and/or mental disabilities, ensuring a fair and inclusive recruitment process. If you require accommodation or special assistance to navigate our website or complete your application, please reach out to our Recruiting Operations Team at Careers@sap.com. As part of our team at SAP, you will have the opportunity to work with cutting-edge innovations that enable over four hundred thousand customers worldwide to collaborate more efficiently and leverage business insights more effectively. While SAP is renowned for its leadership in enterprise resource planning (ERP) software, we have evolved into a market leader in end-to-end business application software and services, spanning database management, analytics, intelligent technologies, and experience management. With a global workforce of over one hundred thousand employees and two hundred million users, we are driven by purpose and future-focused, fostering a collaborative team spirit and a commitment to personal development. In this dynamic and inclusive environment, every individual at SAP plays a crucial role in connecting global industries, people, and platforms to ensure that every challenge finds a deserving solution. Join us at SAP to bring out your best and be part of a team that values diversity, inclusion, and personal growth. Successful candidates for this role may be subject to a background verification process conducted by an external vendor. If you are a SAP employee, please note that only permanent roles are eligible for the SAP Employee Referral Program, subject to the eligibility criteria outlined in the SAP Referral Policy. Specific conditions may apply for roles in Vocational Training. Requisition ID: 431375 | Work Area: Software-Development Operations | Expected Travel: 0 - 10% | Career Status: Professional | Employment Type: Regular Full Time | Additional Locations: #LI-Hybrid. Job Segment: Cyber Security, ERP, Cloud, Information Security, Compliance, Security, Technology, Legal,
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
64580 Jobs | Dublin
Wipro
25801 Jobs | Bengaluru
Accenture in India
21267 Jobs | Dublin 2
EY
19320 Jobs | London
Uplers
13908 Jobs | Ahmedabad
Bajaj Finserv
13382 Jobs |
IBM
13114 Jobs | Armonk
Accenture services Pvt Ltd
12227 Jobs |
Amazon
12149 Jobs | Seattle,WA
Oracle
11546 Jobs | Redwood City