Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 8.0 years
2 - 6 Lacs
hyderabad
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of sec...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
gurugram
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of sec...
Posted 2 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
pune
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of sec...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of sec...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of sec...
Posted 2 weeks ago
5.0 - 8.0 years
7 - 11 Lacs
chennai
Work from Office
Job Description Role Purpose The purpose of this role is to provide significant technical expertise in architecture planning and design of the concerned tower (platform, database, middleware, backup etc) as well as managing its day-to-day operations Do Provide adequate support in architecture planning, migration & installation for new projects in own tower (platform/dbase/ middleware/ backup) Lead the structural/ architectural design of a platform/ middleware/ database/ back up etc. according to various system requirements to ensure a highly scalable and extensible solution Conduct technology capacity planning by reviewing the current and future requirements Utilize and leverage the new feat...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of sec...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of sec...
Posted 2 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of sec...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of sec...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
mumbai
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of sec...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of sec...
Posted 2 weeks ago
2.0 - 6.0 years
5 - 10 Lacs
chennai
Work from Office
Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA As a Security Managed Services Engineer (L2) at NTT DATA, your role will be to ensure that our clients' security infrastructures and systems remain operational. With a proactive approach, you'll monitor, identify, investigate, and resolve technical incidents and problems, restoring service efficiently. Your primary objective will be to handle client requ...
Posted 2 weeks ago
1.0 - 6.0 years
7 - 10 Lacs
gurugram
Work from Office
We're Hiring a Cyber Security Consultant (ISO, CISA, CISSP, CIPP, CIPM) We are seeking a highly skilled and experienced Cyber Security Consultant with certifications in ISO, CISA, CISSP, CIPP, and CIPM. The ideal candidate will have a strong background in privacy, data protection, and cyber security. Key Responsibilities: Develop and implement cyber security strategies and protocols. Conduct risk assessments and vulnerability testing. Monitor security incidents and provide incident response. Provide expertise in privacy and data protection regulations. Collaborate with cross-functional teams to ensure compliance and security. Qualifications: Certifications: ISO, CISA, CISSP, CIPP, CIPM. Bach...
Posted 2 weeks ago
5.0 - 7.0 years
5 - 14 Lacs
gurugram
Work from Office
Data Protection, Privacy, VAPT, Cyber Governance, ISO, and BCP/DR Specialist We are seeking a highly skilled Data Protection, Privacy, VAPT, Cyber Governance, ISO, and BCP/DR Specialist to join our dynamic team. This role is for candidates holding a B Tech or MCA/MBA (preferred) degree with a strong passion for cybersecurity and a keen eye for detail. Key Responsibilities: Develop and implement data protection and privacy strategies Conduct Vulnerability Assessment and Penetration Testing (VAPT) to identify and address security vulnerabilities Ensure compliance with ISO standards and regulatory requirements Manage Cyber Governance practices and frameworks Develop and maintain Business Contin...
Posted 2 weeks ago
3.0 - 5.0 years
4 - 9 Lacs
chennai
Work from Office
Responsibilities: * Conduct penetration tests on web apps using OWASP principles. * Identify vulnerabilities through network NPT & ethical hacking techniques. * Collaborate with customers to implement and mitigate identified security vulnerabilities Health insurance Provident fund
Posted 2 weeks ago
3.0 - 7.0 years
7 - 11 Lacs
bengaluru
Work from Office
Will be working on Application security testing Skills. Strategize and plan static and dynamic application security testing (SAST/DAST / SCA) tools. Will be responsible for Secure Coding Practices Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 5 plus years of experience Application Security Testing: Experience with static and dynamic application security testing (SAST/DAST/ SCA) tools. Secure Coding Practices: Knowledge of secure coding standards (e.g., OWASP Top Ten) and experience in reviewing code for security vulnerabilities. Threat Modeling...
Posted 2 weeks ago
6.0 - 11.0 years
4 - 8 Lacs
hyderabad
Work from Office
Skills : Senior Security Engineer Location : Pan India Notice Period :Immediate. Type: Contract Description Network Vulnerability management. Occasional network pen testing Network security architect The scope of the consultant services is to assist IKEA in Understanding the network architecture of MP. Assessing the vulnerability of the infrastructure. Scanning through the various reports of network vulnerability scans. Mitigation plan and report of various network vulnerability. Guiding infrastructure team around OT security. Requirements for this position. Industry experience of around 10 to 15 yrs . Ability to identify network attacks and systemic security issues as they relate to threats...
Posted 2 weeks ago
4.0 - 8.0 years
1 - 4 Lacs
hyderabad
Work from Office
Security Engineer Job Description: Location: Hyderabad Job Type: Full-time Work from Office Experience Level: Senior-Level Summary: We are seeking a detail-oriented and experienced Security Engineer to join our team. The ideal candidate will be responsible for designing and implementing security measures across our web, desktop, and cloud-based applications. You will play a critical role in safeguarding our infrastructure, identifying vulnerabilities, and ensuring compliance with best practices and security standards. Key Responsibilities: Design and implement security controls and best practices across web, desktop and cloud environments. Conduct threat modelling, risk assessments, and vuln...
Posted 2 weeks ago
4.0 - 9.0 years
4 - 8 Lacs
bengaluru
Work from Office
In this role, you will have the opportunity to support the strategic technology direction by contributing your own ideas for identifying, proposing, and implementing innovative technology, software and solutions. Each day, you will assist the Research and Development (R&D) team by executing your assigned tasks and using technical knowledge in a structured way. You will also showcase your expertise by staying abreast of the state of the art and actively applying this knowledge. Roles and Responsibilities : Security and network robustness assessment testing of embedded devices and host based industrial softwares, Web applications, APIs and Mobile Apps. In-depth analysis of results and writing ...
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
haryana
On-site
As a Security Analyst, your role will involve the following key responsibilities: - Perform security assessments: Conduct detailed penetration tests on web applications, networks, and computer systems to identify vulnerabilities. - Analyze and report findings: Document methodologies, findings, and actionable remediation strategies in comprehensive reports for stakeholders. - Collaborate on solutions: Work with other teams, such as security analysts and system administrators, to implement and validate security fixes. - Conduct social engineering tests: Simulate attacks like phishing to test the organization's security readiness against human-based exploits. - Stay current with threats: Resear...
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
maharashtra
On-site
Job Description As an Ethical Hacking / IT Security Trainer at SKYNET SECURE, your primary responsibility will be training individuals in the field of cyber security. You may have the opportunity to transition into a consultant role in the future, but for now, we are looking for a dedicated Trainer. Key Responsibilities: - Conduct training sessions on topics such as Metasploit, OWASP top ten attacks, Burpsuite, Kali Linux, Acunetix, Nessus, Nmap tools, etc. - Perform Vulnerability Assessment to identify and address security weaknesses. - Carry out Penetration testing to evaluate the security of systems and networks. - Demonstrate good effective communication skills, particularly in English. ...
Posted 2 weeks ago
2.0 - 7.0 years
15 - 30 Lacs
hyderabad
Work from Office
Overview Work with engineering teams to develop and improve our CI / CD pipelines that enforce proper versioning and branching practices using technologies like Github, Github Actions, ArgoCD, Kubernetes, Docker and Terraform. Create, deploy & maintain Kubernetes based platforms for a variety of different workloads in AWS and Azure. Responsibilities Implement and manage threat detection protocols, processes and systems. Conduct regular vulnerability assessments and ensure timely remediation of flagged incidents. Ensure compliance with internal security policies and external regulations like PCI. Lead the integration of security tools such as Wiz, Snyk, DataDog and others within the Pepsico i...
Posted 2 weeks ago
2.0 - 6.0 years
3 - 7 Lacs
bengaluru
Work from Office
About The Role Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Data Loss Prevention (DLP) Good to have skills : Endpoint Protection Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. A typical day involves collaborating with various t...
Posted 2 weeks ago
8.0 - 13.0 years
13 - 17 Lacs
hyderabad
Work from Office
About The Role Project Role Security Architect Project Role Description Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills CyberArk Privileged Access Management Good to have skills NA Minimum 3 year(s) of experience is required Educational Qualification 15 years full time education Summary As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with variou...
Posted 2 weeks ago
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
174558 Jobs | Dublin
Wipro
55192 Jobs | Bengaluru
EY
44116 Jobs | London
Accenture in India
37169 Jobs | Dublin 2
Turing
30851 Jobs | San Francisco
Uplers
30086 Jobs | Ahmedabad
IBM
27225 Jobs | Armonk
Capgemini
23907 Jobs | Paris,France
Accenture services Pvt Ltd
23788 Jobs |
Infosys
23603 Jobs | Bangalore,Karnataka