Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
1.0 - 4.0 years
2 - 5 Lacs
noida
Work from Office
Roles and Responsibility Ensure the safety and security of patients, staff, and clinic premises. Monitor and report any suspicious activity or incidents to management. Maintain a high level of visibility and presence on the clinic premises. Develop and implement effective security protocols and procedures. Collaborate with other departments to ensure seamless operations. Provide excellent customer service and respond to patient inquiries. Job Requirements Minimum 2 years of experience in a similar role, preferably in a healthcare or dermatology setting. Strong knowledge of security principles and practices. Excellent communication and interpersonal skills. Ability to work effectively in a fa...
Posted 1 day ago
3.0 - 6.0 years
7 - 11 Lacs
noida
Work from Office
Key responsibilities Lead operational security initiatives across infrastructure and cloud environments Implement and maintain network security controls, including firewalls and segmentation Conduct vulnerability assessments and manage remediation workflows Drive adoption of Zero Trust principles across systems and services Oversee access control policies and identity management practices Coordinate and respond to security incidents and investigations Perform regular security audits and configuration reviews Develop and enforce backup and recovery strategies aligned with security policies Apply security hardening techniques across endpoints, servers, and cloud assets Align operational practi...
Posted 1 day ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 day ago
5.0 - 8.0 years
5 - 9 Lacs
chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 day ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 day ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 day ago
5.0 - 8.0 years
5 - 9 Lacs
chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 day ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 day ago
5.0 - 8.0 years
5 - 9 Lacs
chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 day ago
1.0 - 6.0 years
0 - 0 Lacs
gurugram
On-site
Job Title: Functional Consultant Industry: IT Services & Consulting Department: Consulting Employment Type: Full-Time, Permanent Role Category: IT Consulting Job Overview: We are seeking a motivated individual to handle monitoring, scripting, and Linux system administration tasks. This role involves installing and configuring Linux environments for new builds, managing production, staging, and development environments on cloud platforms, and ensuring smooth patching and cluster switching processes. The candidate will also engage with customers to understand deployment, integration, and architecture requirements. Key Responsibilities: Install and configure Linux operating systems for new envi...
Posted 1 day ago
5.0 - 9.0 years
0 Lacs
thiruvananthapuram, kerala
On-site
As a Security Advisory Consultant at EY, you will play a crucial role in advising EY's Advisory and TAS service lines on security matters, including managing a global managed services platform, big data and analytics solutions, as well as individual line of business solutions. Your responsibilities will involve defining security architectures, providing security guidance, identifying security-related requirements, promoting secure designs, and facilitating the delivery of information security services throughout the system development life cycle. You will also be responsible for translating technical vulnerabilities into business risk terminology for effective communication with stakeholders...
Posted 2 days ago
5.0 - 9.0 years
0 Lacs
karnataka
On-site
As an Android Malware Analyst, your primary responsibility will be to conduct thorough analysis of Android malware by performing static and dynamic analysis. You will be required to reverse-engineer malicious APKs and SDKs to understand their behavior and intent. Identifying spyware, trojans, rootkits, and other threats will be crucial aspects of your role. Additionally, analyzing network traffic and backend systems for vulnerabilities and potential data leakage will be part of your daily tasks. It will be important for you to document your findings and present detailed reports to both technical and non-technical stakeholders. You will also have the opportunity to participate in client-facin...
Posted 2 days ago
10.0 - 14.0 years
0 Lacs
maharashtra
On-site
Role Overview: You should have a Bachelor's degree in computer science, information systems, cyber security, or a related field. With at least 10 years of relevant experience in cyber security. Your knowledge should include information technology operation such as cloud, data, system, application, and infrastructure. You should also have knowledge of cyber security assessment including security audit, vulnerability assessment, and penetration testing. Familiarity with cyber security products like End-Point Solution (EDR), WAF, DLP, SIEM, and SOAR is required. Understanding market best practices and frameworks such as ITIL, ISO, PCI-DSS, and NIST is essential. Certification in cyber security ...
Posted 2 days ago
3.0 - 6.0 years
5 - 14 Lacs
hyderabad
Work from Office
Enterprise Information Security at Providence is responsible for appropriately protecting all information relating to its caregivers and affiliates, as well as protecting its confidential business information (including information relating to its caregivers, affiliates, and patients) *Note: Please be noted this is 5-day work from office, early joiners are preferred. What will you be responsible for? Assist in the responsibility for the reviewing vulnerabilities' data from multiple sources (i.e. external / internal penetration testing, internal / external vulnerability scanning, etc.) across multiple technologies to determine risk rating of vulnerabilities to business assets. Assist in impro...
Posted 2 days ago
2.0 - 5.0 years
3 - 7 Lacs
nagpur
Work from Office
Conduct security testing, including vulnerability assessments and penetration testing Design and implement security frameworks for blockchain applications Ensure secure interactions between the blockchain platform. Required Candidate profile Experience in securing blockchain-based applications. Familiarity with decentralized identity solutions Security certifications such as CISSP, CEH, CISM, or Blockchain Security Professional (CBSP)
Posted 2 days ago
3.0 - 8.0 years
11 - 16 Lacs
bengaluru
Work from Office
Security Consultant(FTE) Location - Bangalore(Murgeshpalya) Notice Period - 0 to 15 days(max) Key Responsibilities: Process Responsibility: • Deploy companys SDL (Secure Development Lifecycle) Prepare and present FCSR for .Net based application. • Create/Maintain central repository of security artefacts, create and own security plan updates. • Act as an expert facilitator on practices such as secure design, threat modelling, and vulnerability management • Act as a point of contact for cybersecurity issues for application. • Support product owners and CS Architect in specifying security requirements and bring knowledge of relevant CS standards and regulations. • Support product teams with sec...
Posted 2 days ago
7.0 - 12.0 years
8 - 18 Lacs
bengaluru
Hybrid
Key Responsibilities: Process Responsibility: • Deploy companys SDL (Secure Development Lifecycle) Prepare and present FCSR for .Net based application. • Create/Maintain central repository of security artefacts, create and own security plan updates. • Act as an expert facilitator on practices such as secure design, threat modelling, and vulnerability management • Act as a point of contact for cybersecurity issues for application. • Support product owners and CS Architect in specifying security requirements and bring knowledge of relevant CS standards and regulations. • Support product teams with security best practices for design, automation, and tool selection. • Support site, team, and off...
Posted 2 days ago
5.0 - 10.0 years
15 - 25 Lacs
bengaluru
Remote
Experience: 5+ years with experience in SNOW Vulnerability Module. Key Responsibilities: Strong background in ServiceNow Security Operations, a deep understanding of Vulnerability Management (VM), Good experience in ServiceNow development on ITSM module Excellent experience in Integrating third party tools with ServiceNow using web services and connectors Implement and manage the Vulnerability Management module in ServiceNow. Integrate vulnerability scanners with ServiceNow. Develop and automate workflows using ServiceNow Flow Designer and Orchestration to manage vulnerabilities.. Perform regular testing and validation of vulnerability data and its accuracy in the system. Create reports and ...
Posted 2 days ago
5.0 - 10.0 years
10 - 20 Lacs
hyderabad
Remote
Experience: 5+ years (5-7 years) with experience in SNOW Vulnerability Module. Location: India ( Work From Home) Key Responsibilities: Strong background in ServiceNow Security Operations, a deep understanding of Vulnerability Management (VM), Good experience in ServiceNow development on ITSM module Excellent experience in Integrating third party tools with ServiceNow using web services and connectors Implement and manage the Vulnerability Management module in ServiceNow. Integrate vulnerability scanners with ServiceNow. Develop and automate workflows using ServiceNow Flow Designer and Orchestration to manage vulnerabilities.. Perform regular testing and validation of vulnerability data and i...
Posted 2 days ago
2.0 - 7.0 years
8 - 13 Lacs
pune
Work from Office
BMC Software is looking for a motivated and skilled individual to join the Product Security Group. This is a senior technical position in the team. The candidate will be responsible for engaging with various product teams on security architecture reviews, SaaS security, penetration testing. A penetration tester plays a crucial role in safeguarding an organization's digital assets and information by proactively identifying and addressing security weaknesses. This role requires a high level of technical expertise, ethical conduct, and a commitment to continuous improvement in the field of cybersecurity. Roles and Responsibilities: Conduct thorough vulnerability assessments of applications and ...
Posted 2 days ago
5.0 - 8.0 years
13 - 18 Lacs
bengaluru
Work from Office
Understand application and API functionality of DV core products Implement secure code and develop security vulnerability fixes mitigations and remediations across DVs applications workloads APIs etc. Work with client's security testing teams to help triage potential security issues vulnerabilities. Promote secure development best practices and assist training development and DevOps teams on secure development and secure SDLC. Be engaged in security testing processes and meetings held across DVs application development teams. Ability to apply security knowledge and experience in a DevOps development lifecycle. Drive penetration testing remediation activities for web application vulnerabiliti...
Posted 2 days ago
7.0 - 10.0 years
8 - 13 Lacs
bengaluru
Work from Office
Results-driven CyberArk PAM Specialist with 7-10 years of hands-on experience in designing, implementing, and optimizing CyberArks Privileged Access Management platform. The ideal candidate will have strong hands-on experience with CyberArk Core Privilege Access Security (PAS), including Digital Vault, Central Policy Manager (CPM), Privileged Session Manager (PSM), Privileged Vault Web Access (PVWA), Privileged Threat Analytics (PTA), and Endpoint Privilege Manager (EPM). The candidate will play a key role in securing privileged access across the enterprise, ensuring least privilege, and supporting Zero Trust initiatives. Strong analytical thinking, ability to solve complex problems, trouble...
Posted 2 days ago
2.0 - 5.0 years
4 - 9 Lacs
chennai, mumbai (all areas)
Hybrid
Role & responsibilities Servers and Endpoints VA and Configuration Review Network Security Testing, Infrastructure Penetration Testing, Network VA and Configuration Review, Vulnerability Management Tool Experience: Qualys VMDR, Nipper, BurpSuite, Nessus, Metasploit, OpenText, Vulnerability Management and Tracking Solutions Preferred candidate profile Interpersonal Skillset: Should have a client facing experience. Should have good client interaction as well. Should be confident while interacting to the client and presenting the observations.
Posted 2 days ago
3.0 - 7.0 years
7 - 11 Lacs
bengaluru
Work from Office
Will be working on Application security testing Skills. Strategize and plan static and dynamic application security testing (SAST/DAST / SCA) tools. Will be responsible for Secure Coding Practices Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 5 plus years of experience Application Security Testing: Experience with static and dynamic application security testing (SAST/DAST/ SCA) tools. Secure Coding Practices: Knowledge of secure coding standards (e.g., OWASP Top Ten) and experience in reviewing code for security vulnerabilities. Threat Modeling...
Posted 2 days ago
4.0 - 6.0 years
4 - 8 Lacs
chennai
Work from Office
Implement and manage SOAR solutions to improve incident response times and efficiency. Monitor security alerts, assess potential threats, and take appropriate action to mitigate risks. Analyze complex security events and provide detailed reports and recommendations. Collaborate with IT and security teams to enhance threat detection and response strategies. Develop and maintain automation scripts and playbooks for security processes. Conduct regular reviews and updates of security protocols and procedures. Provide training and guidance to junior analysts on SOAR practices and tools. Required education Bachelor's Degree Preferred education Bachelor's Degree Required technical and professional ...
Posted 2 days ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
81102 Jobs | Dublin
Wipro
28851 Jobs | Bengaluru
Accenture in India
24265 Jobs | Dublin 2
EY
21926 Jobs | London
Uplers
15950 Jobs | Ahmedabad
IBM
15060 Jobs | Armonk
Bajaj Finserv
14778 Jobs |
Amazon.com
14002 Jobs |
Accenture services Pvt Ltd
13694 Jobs |
Capgemini
13629 Jobs | Paris,France