Home
Jobs

42 Va Jobs - Page 2

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3 - 7 years

5 - 8 Lacs

Chennai, Bengaluru, Hyderabad

Work from Office

Naukri logo

Hi, We have vacancy for Under writing for Only Bangalore location . Pls check & call if you are interested to relocate Bangalore location. Immediate joining is required or short notice of 15 days is required. Salary upto 8.5 LPA + Relocation Bonus of 14k to relocate Bangalore will be provided. Should have 3-4 years of experience in Underwriting is required. Good communication is required. Immediate joining is required.

Posted 2 months ago

Apply

10 - 12 years

7 - 7 Lacs

Chennai

Work from Office

Naukri logo

Dear Job Aspirants, Greetings from Global Healthcare Billing Partners Pvt Ltd !! Opening for Assistant Manager - IT (System Administration). Job Summary : The Assistant Manager of network Support works closely with the Senior Manager to ensure the efficient functioning of the organization's network infrastructure. This role involves assisting in network maintenance, troubleshooting, team management, and collaborating with other IT teams. The Assistant Manager plays a critical role in helping the team meet the organization's network-related goals and objectives. Responsibilities: Assist in monitoring and maintaining the organization's network infrastructure to ensure uptime and performance. Provide technical support and troubleshooting assistance to resolve network-related issues. Collaborate with the team to implement network changes and upgrades. Support the Senior Manager in managing and mentoring the network support team. Help team members develop their skills and guide their day-to-day tasks. Collaborate with team members to ensure efficient workflow and problem resolution Assist in maintaining accurate and up-to-date network documentation, including diagrams, configurations, and procedures. Ensure that the team follows documentation best practices. Assist in managing relationships with network hardware and software vendors. Collaborate with vendors to resolve technical issues and obtain necessary support. Support the implementation and enforcement of network security policies and best practices. Assist in monitoring network traffic for security threats and contributing to risk mitigation efforts. Assist in ensuring compliance with regulatory requirements and industry standards. Assist in the planning and execution of network projects, upgrades and expansions. Participate in project meetings and coordinate tasks with team members to meet project goals. Assist in generating network performance reports and analytics. Provide insights and recommendations for network improvements based on data analysis. Must Have completed any certification course. Computer Science, or a related field. Minimum of 4+ years of experience in network support and administration. Strong knowledge of networking protocols, hardware, and software. Relevant certifications (e.g., CCNA, CompTIA Network+) are a plus. Azure Cloud administration certification. Excellent communication, problem-solving, and project management skills. Ability to work collaboratively in a team environment. Strong problem-solving and analytical skills. Experience : 06+ Years in IT (System Administration) BPO and Medical Billing Company Experience are preferred. Location : Chennai (Velachery) Work Mode : Office Notice : Immediate / 15 Days FOR INTERVIEW CALL - HR 8610738432 / 9150064772 Can whats app your resume to the same Regards, HR TEAM 8610738432/9150064772

Posted 2 months ago

Apply

15 - 18 years

20 - 25 Lacs

Noida

Work from Office

Naukri logo

We are seeking an experienced Senior Information Security Manager to lead our security initiatives and ensure the integrity, confidentiality, and availability of our systems and data. This role is crucial in safeguarding our digital assets and maintaining compliance with industry standards. 1.Should take care of Infosec functions by coordinating with various stakeholders 2. Lead and manage Vulnerability Assessment (VA) and Penetration Testing (PT) programs end to end. 3. Should have technical hands-on knowledge on different VAPT tools, like Qualys, Tenable, BurpSuite, Checkmarx etc. 4.Ensure all cyber security compliance directions issued from time to time by the regulator 5.Coordination with SOC, Technology team to follow up the incidents till closure 6.Follow escalation matrix for delayed issues 7.Assist in Internal and External Audits (Regulatory) and work towards closure of observations if any 8. Should have project management espouse, to run the security PMO for ensuring the multiple initiatives with internal / external teams, vendors, and regulators. 9. Prepare and review new/existing policies, procedures, and secure configure/ hardening documents. 10. Should possess technical skills and knowledge to handle/manage security solutions if required 11. Exposure to Cloud Environment 12. Knowledge of Application Security is a plus. Qualifications and Experience: 1. 15-18 years of experience in security management. 2. Strong understanding of security best practices, frameworks, and security technologies. 3. Proven experience in managing VA, PT, Patch Management, and Audit processes. 4. Familiarity with regulatory requirements and compliance standards (e.g., RBI, SEBI). 5. Demonstrated experience in project management, including planning, execution, and stakeholder management. 6. Excellent communication, interpersonal, and leadership skills. 7. Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Masters degree or relevant certifications preferred.

Posted 3 months ago

Apply

5 - 10 years

35 - 40 Lacs

Bengaluru, Gurgaon

Work from Office

Naukri logo

About The Role : Entity :- Accenture Strategy & Consulting Team :- Global Network Data & AI Practice :- CFO & EV - Risk Analytics Title :- Ind & Func AI Decision Science Consultant Job location :- Gurgaon About S&C - Global Network :- Accenture Global Network - Data & AI practice help our clients grow their business in entirely new ways. Analytics enables our clients to achieve high performance through insights from data - insights that inform better decisions and strengthen customer relationships. From strategy to execution, Accenture works with organizations to develop analytic capabilities - from accessing and reporting on data to predictive modelling - to outperform the competition. WHAT'S IN IT FOR YOU? Accenture CFO & EV team under Data & AI team has comprehensive suite of capabilities in Risk, Fraud, Financial crime, and Finance. Within risk realm, our focus revolves around the model development, model validation, and auditing of models. Additionally, our work extends to ongoing performance evaluation, vigilant monitoring, meticulous governance, and thorough documentation of models. Get to work with top financial clients globally Access resources enabling you to utilize cutting-edge technologies, fostering innovation with the world's most recognizable companies. Accenture will continually invest in your learning and growth and will support you in expanding your knowledge. You'll be part of a diverse and vibrant team collaborating with talented individuals from various backgrounds and disciplines continually pushing the boundaries of business capabilities, fostering an environment of innovation. What you would do in this role Engagement Execution Work independently/with minimal supervision in client engagements that may involve model development, validation, governance, strategy, transformation, implementation and end-to-end delivery of risk solutions for Accenture's clients. Ability to manage workstream of small projects with responsibilities of managing quality of deliverables for junior team members. Demonstrated ability of managing day to day interactions with the Client stakeholders o Practice Enablement o Guide junior team members. o Support development of the Practice by driving innovations, initiatives. o Develop thought capital and disseminate information around current and emerging trends in Risk. Qualifications Job Qualifications Who we are looking for? 2 - 6 years of relevant Risk Analytics experience at one or more Financial Services firms, or Professional Services / Risk Advisory with significant exposure to one or more of the following areas: Development, validation, and audit of: Credit Risk- PD/LGD/EAD Models, CCAR/DFAST Loss Forecasting and Revenue Forecasting Models, IFRS9/CECL Loss Forecasting Models across Retail and Commercial portfolios Credit Acquisition/Behavior/Collections/Recovery Modeling and Strategies, Credit Policies, Limit Management, Acquisition Frauds, Collections Agent Matching/Channel Allocations across Retail and Commercial portfolios Regulatory Capital and Economic Capital Models Liquidity Risk Liquidity models, stress testing models, Basel Liquidity reporting standards o Anti Money Laundering AML scenarios/alerts, Network Analysis o Operational risk AMA modeling, operational risk reporting Conceptual understanding of Basel/CCAR/DFAST/CECL/IFRS9 and other risk regulations Experience in conceptualizing and creating risk reporting and dashboarding solutions. Experience in modeling with statistical techniques such as linear regression, logistic regression, GLM, GBM, XGBoost, CatBoost, Neural Networks, Time series ARMA/ARIMA, ML interpretability and bias algorithms etc. Programing Languages - SAS, R, Python, Spark, Scala etc., Tools such as Tableau, QlikView, PowerBI, SAS VA etc. Strong understanding of Risk function and ability to apply them in client discussions and project implementation. Academic Requirements: Masters degree in a quantitative discipline mathematics, statistics, economics, financial engineering, operations research or related field or MBA from top-tier universities. Strong academic credentials and publications, if applicable. Industry certifications such as FRM, PRM, CFA preferred. Excellent communication and interpersonal skills.

Posted 3 months ago

Apply

5 - 10 years

7 - 12 Lacs

Hyderabad

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityNow Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary We are looking for Developers, Technical Leads and Architects for SailPoint IDN & IIQ Platform. As a Security professional you will be responsible for defining requirements, designing & building security components, & testing SailPoint IDN & IIQ Platform. Flex on skills Oracle, IBM & Saviynt IAM Roles & Responsibilities:1.Configuration, customization, and design SailPoint. 2.Experience in virtual appliance (VA) concepts, Identity Profiles, cloud rules, 3.Transformation rule, migration, and deployments. 4.Ability to Setup, Troubleshoot Configure SailPoint integration with different systems. 5.Able to quickly onboard application and migrating users. 6.Ability to build java bean shell, workflow, JML, custom rules. 7.Liaison with teams on delivery, helping them on issue technical issue, bugs fixing and enhancements Professional & Technical Skills:1.Should have the ability to understand customer requirements. 2.knowledge on Integrating various platforms with SailPoint, such as Active Directory, HR apps, SAP Systems, Workday, AD, Azure O365, JDBC and Other cloud applications. 3.Implementation knowledge on Access request customization. 4.Hands on experience in Customization of Quicklink, User LCM, Certification, Custom workflows, forms, Rules, SailPoint IIQ API/ REST API etc. 5.Implementation experience in Certification, Custom reports Auditing. 6.Strong JAVA/J2EE Development Knowledge 7.Quick learner, team player and self-starter. 8.Willing to learn new technologies cross skilling, Upskilling Good Communication presentation. 9.Good Articulation and presentation skills Additional Information:1.The candidate should have a minimum of 7+ years of experience in SailPoint IIQ & Identity Now2.This position is based across Accenture Location.3.15 years full time education is required.Educational?Qualification:4.BE or MCA or MSc with Good Computer Science Background with good academic record. Qualifications 15 years full time education

Posted 3 months ago

Apply

5 - 9 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityNow Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : BE or MCA or MSc with Good Computer Science Background with good academic record. Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will document the implementation of the cloud security controls and transition to cloud security-managed operations. Your typical day will involve designing and implementing security solutions, collaborating with cross-functional teams, and ensuring the integrity and confidentiality of data in the cloud environment. Must Have Skills:SailPoint IdentityNowGood To Have Skills:Identity and Access ManagementJob Requirements:Key Responsibilities:configuration, customization, and design.Ability to Setup, Troubleshoot Configure SailPoint integration with different systems.Able to quickly onboard application and migrating users.Ability to build java bean shell, workflow, JML, custom rules.Liaison with teams on delivery, helping them on issue technical issue, bugs fixing and enhancements. Technical Experience:Should have the ability to understand customer requirements and be capable of suggesting solutions.Experience in virtual appliance (VA) concepts, Identity Profiles, cloud rules, migration and deploymentsStrong knowledge on Integrating various platforms with SailPoint, such as Active Directory, HR apps, SAP Systems, Workday, AD, Azure O365, JDBC and Other cloud applications.Implementation knowledge on Access request customization.Hands on experience in Customization of Quicklink, User LCM, Certification, Rules, SailPoint IIQ API/ REST API etc.Implementation experience in Certification, Custom reports Auditing.Strong JAVA/J2EE Development Knowledge Professional Attributes:Team lead experience to handle team.Quick learner, team player and self-starter.Willing to learn new technologies cross skilling, Upskilling Good Communication presentation.Good Articulation and presentation skills Educational Qualification:BE or MCA or MSc with Good Computer Science Background with good academic record. Qualifications BE or MCA or MSc with Good Computer Science Background with good academic record.

Posted 3 months ago

Apply

7 - 12 years

9 - 14 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : SailPoint IdentityIQ Good to have skills : SailPoint IdentityNow Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :1.We are looking for Developers, Technical Leads and Architects for SailPoint IDN & IIQ Platform. As a Security professional you will be responsible for defining requirements, designing & building security components, & testing SailPoint IDN & IIQ Platform. Roles & Responsibilities:1.Configuration, customization, and design SailPoint. 2.Experience in virtual appliance (VA) concepts, Identity Profiles, cloud rules, 3.Transformation rule, migration, and deployments. 4.Ability to Setup, Troubleshoot Configure SailPoint integration with different systems. 5.Able to quickly onboard application and migrating users. 6.Ability to build java bean shell, workflow, JML, custom rules. 7.Liaison with teams on delivery, helping them on issue technical issue, bugs fixing and enhancements Professional & Technical Skills:1.Should have the ability to understand customer requirements. 2.knowledge on Integrating various platforms with SailPoint, such as Active Directory, HR apps, SAP Systems, Workday, AD, Azure O365, JDBC and Other cloud applications. 3.Implementation knowledge on Access request customization. 4.Hands on experience in Customization of Quicklink, User LCM, Certification, Custom workflows, forms, Rules, SailPoint IIQ API/ REST API etc. 5.Implementation experience in Certification, Custom reports Auditing. 6.Strong JAVA/J2EE Development Knowledge 7.Quick learner, team player and self-starter. 8.Willing to learn new technologies cross skilling, Upskilling Good Communication presentation. 9.Good Articulation and presentation skills 10.Educational?Qualification:11.BE or MCA or MSc with Good Computer Science Background with good academic record. Additional Information:1.The candidate should have a minimum of 3+ years of experience in SailPoint IIQ & Identity Now2.This position is based across Accenture Location.3.15 years full time education is required. Qualifications 15 years full time education

Posted 3 months ago

Apply

5 - 10 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityNow Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : BE or MCA or MSc with Good Computer Science Background with good academic record. Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will document the implementation of the cloud security controls and transition to cloud security-managed operations. Your typical day will involve designing and implementing security solutions, collaborating with cross-functional teams, and ensuring the integrity and confidentiality of data in the cloud environment. Must Have Skills:SailPoint IdentityNowGood To Have Skills:Identity and Access ManagementJob Requirements:Key Responsibilities:configuration, customization, and design.Ability to Setup, Troubleshoot Configure SailPoint integration with different systems.Able to quickly onboard application and migrating users.Ability to build java bean shell, workflow, JML, custom rules.Liaison with teams on delivery, helping them on issue technical issue, bugs fixing and enhancements. Technical Experience:Should have the ability to understand customer requirements and be capable of suggesting solutions.Experience in virtual appliance (VA) concepts, Identity Profiles, cloud rules, migration and deploymentsStrong knowledge on Integrating various platforms with SailPoint, such as Active Directory, HR apps, SAP Systems, Workday, AD, Azure O365, JDBC and Other cloud applications.Implementation knowledge on Access request customization.Hands on experience in Customization of Quicklink, User LCM, Certification, Rules, SailPoint IIQ API/ REST API etc.Implementation experience in Certification, Custom reports Auditing.Strong JAVA/J2EE Development Knowledge Professional Attributes:Team lead experience to handle team.Quick learner, team player and self-starter.Willing to learn new technologies cross skilling, Upskilling Good Communication presentation.Good Articulation and presentation skills Educational Qualification:BE or MCA or MSc with Good Computer Science Background with good academic record. Qualifications BE or MCA or MSc with Good Computer Science Background with good academic record.

Posted 3 months ago

Apply

2 - 6 years

4 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Technical Lead/ Project Lead Regular reporting & updates Security Intelligence (Practice) Coordination for security reasons External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively: Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization - Expert Process Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk - Expert Functional/Technical - Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills - Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Collaborative Working Execution Excellence Problem Solving & Analytical Skills Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT

Posted 3 months ago

Apply

2 - 6 years

4 - 8 Lacs

Mumbai

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Technical Lead/ Project Lead Regular reporting & updates Security Intelligence (Practice) Coordination for security reasons External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively: Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization - Expert Process Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk- Expert Functional/Technical - Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills - Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Collaborative Working Execution Excellence Problem Solving & Analytical Skills Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT

Posted 3 months ago

Apply

2 - 6 years

4 - 8 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Technical Lead/ Project Lead Regular reporting & updates Security Intelligence (Practice) Coordination for security reasons External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively: Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization - Expert Process Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk - Expert Functional/Technical - Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills - Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Collaborative Working Execution Excellence Problem Solving & Analytical Skills Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT

Posted 3 months ago

Apply

2 - 6 years

4 - 8 Lacs

Chennai

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Technical Lead/ Project Lead Regular reporting & updates Security Intelligence (Practice) Coordination for security reasons External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively: Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization - Expert Process Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk - Expert Functional/Technical - Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills - Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Collaborative Working Execution Excellence Problem Solving & Analytical Skills Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT

Posted 3 months ago

Apply

2 - 6 years

4 - 8 Lacs

Hyderabad

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Technical Lead/ Project Lead Regular reporting & updates Security Intelligence (Practice) Coordination for security reasons External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively: Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization - Expert Process Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk- Expert Functional/Technical - Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills - Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Collaborative Working Execution Excellence Problem Solving & Analytical Skills Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT

Posted 3 months ago

Apply

2 - 6 years

4 - 8 Lacs

Noida

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Technical Lead/ Project Lead Regular reporting & updates Security Intelligence (Practice) Coordination for security reasons External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively: Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization - Expert Process Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk ? Expert Functional/Technical - Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills - Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Collaborative Working Execution Excellence Problem Solving & Analytical Skills Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA?s (90-95%), response time and resolution time TAT

Posted 3 months ago

Apply

2 - 4 years

4 - 6 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Must Have Data Engineer with 2-4 years of experience in handling compliance data . Candidate should have prior ServiceNow knowledge of GRC and TPRM processes. The candidate should have expertise with tableau integrations as well. Analyzing the requirement and development of that requirements by using the best practices suggested by the ServiceNow. Debugging the issues as and when needed. Monitoring the vulnerabilities to check the fetched data from integration. Implementation of workflows and flow designers. Creating the scheduled jobs, creation of client and server-side scripts as per the requirements. Analysis, documentation and management of customer requirements according to standardized methods. Coordination of project activities between clients and project teams. Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Technical Lead/ Project Lead Regular reporting & updates Security Intelligence (Practice) Coordination for security reasons External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively: Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization - Expert Process Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk ? Intermediate Functional/Technical - Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills - N/A Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Collaborative Working Execution Excellence Problem Solving & Analytical Skills Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA?s (95%), response time and resolution time TAT

Posted 3 months ago

Apply

5 - 10 years

7 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityNow Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary:As a Security Architect, you will be responsible for defining the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve documenting the implementation of cloud security controls and transitioning to cloud security-managed operations. You will play a crucial role in safeguarding the organization's data and infrastructure. SailPoint IdentityIQ Roles & Responsibilities:-Define the security architecture, ensuring that it meets the business requirements and performance goals.-Configuration, customization, and design.-Ability to Setup, Troubleshoot Configure SailPoint integration with different systems.-Able to quickly onboard application and migrating users.-Ability to build java bean shell, workflow, JML, custom rules.-Liaison with teams on delivery, helping them on issue technical issue, bugs fixing and enhancements.Technical & Professional skills:-Should have the ability to understand customer requirements and be capable of suggesting solutions.-Experience in virtual appliance (VA) concepts, Identity Profiles, cloud rules, migration and deployments-Strong knowledge on Integrating various platforms with SailPoint, such as Active Directory, HR apps, SAP Systems, Workday, AD, Azure O365, JDBC and Other cloud applications.-Implementation knowledge on Access request customization.-Hands on experience in Customization of Quicklink, User LCM, Certification, Rules, SailPoint IIQ API/ REST API etc.-Implementation experience in Certification, Custom reports Auditing.-Strong JAVA/J2EE Development Knowledge-Team lead experience to handle team.-Quick learner, team player and self-starter.-Willing to learn new technologies cross skilling, Upskilling Good Communication presentation.-Good Articulation and presentation skillsAdditional Information:BE or MCA or MSc with Good Computer Science Background with good academic record.Must Have Skills:SailPoint IdentityNowGood To Have Skills:Identity and Access Management Qualifications 15 years full time education

Posted 3 months ago

Apply

7 - 12 years

9 - 14 Lacs

Gurgaon

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary:1. We are looking for Developers, Technical Leads and Architects for SailPoint IDN & IIQ Platform. As a Security professional you will be responsible for defining requirements, designing & building security components, & testing SailPoint IDN & IIQ Platform.Roles & Responsibilities:1. Configuration, customization, and design SailPoint. 2. Experience in virtual appliance (VA) concepts, Identity Profiles, cloud rules, 3. Transformation rule, migration, and deployments. 4. Ability to Setup, Troubleshoot Configure SailPoint integration with different systems. 5. Able to quickly onboard application and migrating users. 6. Ability to build java bean shell, workflow, JML, custom rules. 7. Liaison with teams on delivery, helping them on issue technical issue, bugs fixing and enhancementsProfessional & Technical Skills:1. Should have the ability to understand customer requirements. 2. knowledge on Integrating various platforms with SailPoint, such as Active Directory, HR apps, SAP Systems, Workday, AD, Azure O365, JDBC and Other cloud applications. 3. Implementation knowledge on Access request customization. 4. Hands on experience in Customization of Quicklink, User LCM, Certification, Custom workflows, forms, Rules, SailPoint IIQ API/ REST API etc. 5. Implementation experience in Certification, Custom reports Auditing. 6. Strong JAVA/J2EE Development Knowledge 7. Quick learner, team player and self-starter. 8. Willing to learn new technologies cross skilling, Upskilling Good Communication presentation. 9. Good Articulation and presentation skills 10. Educational?Qualification:11. BE or MCA or MSc with Good Computer Science Background with good academic record. Additional Information:1. The candidate should have a minimum of 3+ years of experience in SailPoint IIQ & Identity Now2. This position is based across Accenture Location.3. 15 years full time education is required. Qualifications 15 years full time education

Posted 3 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies