Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 10.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityNow Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Engage with multiple teams and contribute on key decisions- Provide solutions to problems for their immediate team and across multiple teams- Develop and implement security policies and procedures- Conduct security assessments and audits- Stay updated on the latest security trends and technologies Professional & Technical Skills: - Must To Have Skills: Proficiency in SailPoint IdentityNow- Good To Have Skills: Experience with SailPoint IdentityIQ- Strong understanding of identity and access management- Knowledge of cloud security best practices- Experience in designing and implementing security solutions- Ability to communicate complex security concepts to non-technical stakeholders Additional Information:- The candidate should have a minimum of 5 years of experience in SailPoint IdentityNow- This position is based at our Bengaluru office- A 15 years full time education is required Qualification 15 years full time education
Posted 2 days ago
5.0 - 10.0 years
13 - 17 Lacs
Noida
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityNow Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Engage with multiple teams and contribute on key decisions- Provide solutions to problems for their immediate team and across multiple teams- Lead security assessments and provide recommendations- Develop security architecture standards and guidelines- Conduct security reviews and audits Professional & Technical Skills: - Must To Have Skills: Proficiency in SailPoint IdentityNow- Strong understanding of cloud security principles- Experience with security architecture design- Knowledge of identity and access management- Hands-on experience with security tools and technologies- Ability to communicate complex security concepts to non-technical stakeholders Additional Information:- The candidate should have a minimum of 5 years of experience in SailPoint IdentityNow- This position is based at our Noida office- A 15 years full time education is required Qualification 15 years full time education
Posted 2 days ago
5.0 - 10.0 years
4 - 8 Lacs
Jaipur
Work from Office
Project Role : Security Advisor Project Role Description : Lead the effort and teams to enable development and implementation of proprietary and innovative security solutions. Assess, manage and ensure compliance to risk reducing behaviors and processes. Must have skills : SailPoint IdentityNow Good to have skills : SailPoint IdentityIQMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Advisor, you will lead the effort and teams to enable development and implementation of proprietary and innovative security solutions. Assess, manage and ensure compliance to risk reducing behaviors and processes. Show creativity in problem-solving and decision-making processes throughout the day. Roles & Responsibilities:- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Engage with multiple teams and contribute on key decisions- Provide solutions to problems for their immediate team and across multiple teams- Lead the development and implementation of security solutions- Assess and manage risk reducing behaviors and processes- Ensure compliance with security standards Professional & Technical Skills: - Must To Have Skills: Proficiency in SailPoint IdentityNow- Strong understanding of security solutions implementation- Experience with security risk assessment and management- Hands-on experience with security compliance processes- Knowledge of security best practices Additional Information:- The candidate should have a minimum of 5 years of experience in SailPoint IdentityNow- This position is based at our Jaipur office- A 15 years full-time education is required Qualification 15 years full time education
Posted 2 days ago
15.0 - 20.0 years
13 - 17 Lacs
Pune
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityNow Good to have skills : NAMinimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Expected to provide solutions to problems that apply across multiple teams.- Develop and implement security solutions for cloud environments.- Conduct security assessments and audits to identify vulnerabilities.- Provide guidance on security best practices and compliance requirements. Professional & Technical Skills: - Must To Have Skills: Proficiency in SailPoint IdentityNow.- Strong understanding of cloud security principles.- Experience with security architecture design and implementation.- Knowledge of security technologies and tools.- Hands-on experience with security assessments and audits. Additional Information:- The candidate should have a minimum of 12 years of experience in SailPoint IdentityNow.- This position is based at our Pune office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 days ago
2.0 - 7.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Product Security Good to have skills : Security Architecture DesignMinimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Automotive Cybersecurity Architect, you will define the end-to-end security architecture and strategy for in-vehicle systems, telematics, and cloud-connected services, ensuring alignment with regulatory requirements and industry best practices. You will also lead penetration testing efforts, document security controls across ECUs and communication interfaces, and guide the implementation of secure system designs across the vehicle ecosystem. Roles & Responsibilities:Define and implement end-to-end cybersecurity architecture for connected vehicles, ECUs, and backend services, ensuring alignment with ISO/SAE 21434, UNECE WP.29, and CSMS requirements.Develop secure communication and firmware update frameworks, supporting over-the-air (OTA) updates and in-vehicle data integrity.Perform threat modeling and risk analysis using industry-standard methodologies such as HEAVENS, STRIDE, and attack trees to identify vulnerabilities across vehicle networks and interfaces.Guide the definition of mitigation strategies and ensure full traceability between threats, assets, and controls throughout the development lifecycle.Plan and lead security validation activities, including advanced penetration testing and fuzzing of vehicle interfaces (CAN, DoIP, Ethernet, Bluetooth, Wi-Fi, Cellular).Create and maintain documentation for test cases, tooling, security controls, and validation outcomes across ECUs and connected modules.Collaborate with cross-functional teams to drive secure design practices in diagnostics, boot process, and firmware integrity verification.Conduct vulnerability assessments using tools such as CANoe, CANalyzer, Wireshark, Ghidra, and custom analysis scripts, and support remediation planning.Lead red team exercises and security reviews in coordination with product security and development teams.Represent cybersecurity in internal audits and regulatory assessments, ensuring alignment with WP.29 R155/R156 and ISO 26262.Work with suppliers and partners to evaluate and integrate security solutions aligned with evolving vehicle cybersecurity requirements. Professional & Technical Skills: Extensive experience (12+ years) in embedded and automotive systems, with over 6 years specializing in automotive cybersecurity strategy, architecture, and threat analysis.Hands-on experience designing and executing penetration testing of automotive systems, including ECUs, ADAS, telematics, infotainment, and V2X components, across in-vehicle networks and external interfaces.Strong knowledge of in-vehicle communication protocols such as CAN, LIN, FlexRay, DoIP, and automotive diagnostic protocols (UDS), as well as wireless technologies including Bluetooth, Wi-Fi, and Cellular.In-depth understanding of secure communication protocols and cryptographic standards, including TLS, MACsec, AES, RSA, ECC, and Public Key Infrastructure (PKI) for automotive applications.Proven experience in designing and implementing Secure Boot, Secure OTA (Over-the-Air) update mechanisms, and ECU firmware authentication using HSMs and trusted execution environments.Demonstrated ability to conduct and lead threat modeling and risk assessments using HEAVENS, STRIDE, attack trees, and DFD methodologies in compliance with ISO/SAE 21434.Familiarity with regulatory and compliance frameworks such as UNECE WP.29 (R155/R156), CSMS, and ISO 26262, and practical experience aligning security activities to these standards.Proficiency in security validation tools and platforms including Canoe, CANalyzer, Wireshark, Ghidra, Scapy, and custom-built tools for binary analysis, fuzzing, and reverse engineering.Experience guiding vulnerability remediation efforts across hardware and software development teams in an Agile or V-model development environment.Strong technical documentation skills and the ability to translate complex cybersecurity concepts into actionable guidance for engineering and compliance teams.Capable of engaging with external vendors, regulatory bodies, and cross-functional stakeholders to align security requirements, audits, and certifications. Additional Information:7+ years experience implementing and performing Automotive CybersecurityThis position is based at our Bengaluru officeA 15-year full time education is requiredGood to have Certifications in ISO 21434, CISSP, CEH, OSCP, GICSP Qualification 15 years full time education
Posted 2 days ago
12.0 - 17.0 years
20 - 25 Lacs
Gurugram
Work from Office
Job Description: We are seeking a highly skilled and experienced Cyber Defense Incident Responder to join our team. The ideal candidate will have over 12 years of extensive experience in the field of cyber security, possessing a strong background in identifying, analyzing, and responding to cyber threats and incidents. Mandatory requirements: Certification Combination: The candidate should hold one of the following certification combinations: OSCP (Offensive Security Certified Professional) and CISSP (Certified Information Systems Security Professional) CEH (Certified Ethical Hacker) and CISSP (Certified Information Systems Security Professional) Vulnerability Assessment and Penetration Testing (VAPT): Proficiency in conducting comprehensive VAPT assessments to identify vulnerabilities and weaknesses within information systems. Application Security: A deep understanding of application security, including the ability to assess, secure, and monitor applications for potential threats and vulnerabilities. Network Architecture: In-depth knowledge of network architecture, protocols, and security measures to effectively safeguard network infrastructure. India Centric Pre-Sales Experience: The candidate should have experience in client interaction, proposal building, and crafting complex security solutions tailored to the Indian market. India Centric Project Delivery Experience: Proven track record in successfully delivering cybersecurity projects for Indian clients. Team Management: Demonstrated expertise in managing large teams involved in incident response and cybersecurity operations. Additional Information: Not Looking for SOC Candidates: This position is not suited for candidates primarily focused on Security Operations Center (SOC) roles. The company is seeking a specialized incident responder. No GCC Candidates: The organization is not considering candidates from the Global Capability Center (GCC) background. If you meet the mandatory requirements and have a passion for proactively defending against cyber threats, we encourage you to apply for this challenging and rewarding role. Apply for this position Full Name * Email * Phone * Cover Letter * Upload CV/Resume * Upload CV/Resume * Allowed Type(s): .pdf, .doc, .docx By using this form you agree with the storage and handling of your data by this website. *
Posted 2 days ago
6.0 - 10.0 years
22 - 30 Lacs
Hyderabad
Work from Office
This position is responsible for executing and troubleshooting test cases between lab systems, performing test-affected lookups, maintaining ancillary databases, and analyzing data impacts. This role requires advanced analytical skills and the ability to execute complex test plans. Duties and Responsibilities: Execute Secondary Interface and complex processing system test plans, including creating accessions, entering results, generating processing labels, reviewing results, and performing retesting. Perform test-affected analysis, document findings, and assess the impact of system changes. Conduct quality control reviews of database updates and ensure data integrity. Handle draw fee updates and modifications, including site-specific draw fee changes. Review and update SHLs (sample handling logic) in QTIM database. Manage eDBR cases and oversee database modifications in QTIM database. Perform Y-site updates and database maintenance in ancillary systems. Create interface test plans and oversee their execution. Review and process custom panel request, ensuring accuracy and compliance. Follow established processes and procedures to meet Service Level Agreements (SLAs) and Service Level Objectives (SLOs). Provide troubleshooting support for database-related issues. Ensure compliance with database policies, procedures, conventions, and guidelines. Perform additional database-related tasks as assigned.
Posted 2 days ago
4.0 - 9.0 years
15 - 30 Lacs
Hyderabad
Work from Office
The primary responsibilities include managing vulnerability assessments using the Qualys tool, creating detailed metrics and reports, and collaborating with relevant teams to ensure timely remediation of identified vulnerabilities. To ensure the organization's IT infrastructure remains secure by proactively identifying, assessing, and mitigating vulnerabilities through effective use of the Qualys tool and coordinated efforts with cross-functional teams. The basic purpose of this position is to safeguard the organization's digital assets by maintaining a robust vulnerability management program that prioritizes risk reduction and compliance with security policies. Perform daily vulnerability assessments, create weekly metrics and reports, and handle ad-hoc requests as they arise. Work on analytical projects to enhance the vulnerability management process and develop strategies to address identified security issues. Prepare and present metrics and reports to senior leadership, showcasing trends in vulnerabilities over the year and how they are being addressed. Produce reports daily, weekly, and as needed on vulnerability assessments and remediation efforts. Responsible for training new hires and occasionally participating in candidate interviews. Technical/Job Specific Knowledge Vulnerability Management: In-depth knowledge of vulnerability assessment, prioritization, and remediation processes. Qualys: Proficiency in using Qualys for scanning, identifying, and managing vulnerabilities across various environments. Security Frameworks: Familiarity with industry standards and frameworks such as OWASP, NIST, and CIS. Network Security: Understanding of network protocols, firewalls, and intrusion detection/prevention systems. Skills Analytical Skills: Strong analytical abilities to identify and assess vulnerabilities and their potential impact. Technical Aptitude: Competence in using security tools and technologies to perform thorough assessments. Problem-Solving: Effective problem-solving skills to develop and implement remediation plans. Communication: Clear and concise communication skills to report findings and collaborate with different teams. Attention to Detail: High level of attention.
Posted 2 days ago
2.0 - 6.0 years
5 - 9 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 2 days ago
5.0 - 10.0 years
5 - 9 Lacs
Pune
Work from Office
Key Responsibilities: Lead and execute vulnerability assessments across enterprise systems using Qualys VMDR and related modules. Manage and optimize Qualys scanning infrastructure including scanner appliances and cloud agents. Develop and maintain scanning strategies and schedules for internal and external assets. Analyze scan results, prioritize vulnerabilities based on risk, and coordinate remediation efforts with stakeholders. Generate detailed reports and dashboards using Qualys reporting tools and best practices. Ensure compliance with internal security policies and external regulatory requirements. Provide technical guidance and mentorship to junior team members. Collaborate with IT, DevOps, and application teams to integrate vulnerability management into CI/CD pipelines. Required Skills and Experience: 5+ years of experience in vulnerability assessment and management. Hands-on experience with Qualys VMDR, Patch Management, and Continuous Monitoring. Strong understanding of vulnerability lifecycle, CVSS scoring, and remediation workflows. Experience with asset discovery, host tracking, and scanning best practices. Familiarity with scripting (Python, PowerShell) for automation and integration. Knowledge of network protocols, operating systems, and web application security. Industry certifications such as CEH, CISSP, or Qualys certifications are a plus. Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Vulnerability Management. Experience3-5 Years.
Posted 2 days ago
5.0 - 8.0 years
5 - 9 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: SAP Security. Experience5-8 Years.
Posted 2 days ago
5.0 - 8.0 years
5 - 9 Lacs
Mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Active Directory. Experience5-8 Years.
Posted 2 days ago
5.0 - 7.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Job Summary Assist in implementing, maintaining and testing SOX controls supporting the Application Managers for custom applications and 3rd party Applications, support internal and external audits, and identify potential SOX compliance risks. Key Responsibilities: Pre-Implementation Quality CheckConduct a thorough review of controls design and implementation before product/functional go-live, based on evidence submitted by engineering and application management teams. SOX ITGC and Automated Controls EvaluationTest and evaluate the effectiveness of SOX IT General Controls (ITGC) and automated controls using audit checklists prepared by the Controls team to: Maintain SOX controls for internal and third-party products Support internal and external audits related to SOX compliance Control Testing DocumentationDocument control testing procedures and findings in a clear and concise manner. Control Deficiency Identification and ReportingIdentify and report any control deficiencies or weaknesses to ensure prompt remediation. SOX Compliance ReportingPrepare comprehensive reports and documentation for SOX compliance activities, including testing results and control evaluations. Cross-Functional CollaborationCollaborate with cross-functional teams to ensure the thoroughness and accuracy of controls implementation and testing. Educational Qualifications: Bachelor's degree in engineering, finance, or a related field CIA, CISA or CISSP certification Experience: 5-7 years of experience in SOX compliance testing, internal controls, or auditing Knowledge: Strong understanding of SOX regulations, internal controls, and accounting principles. Familiarity with auditing Oracle, Workday and/or Salesforce suite of applications. Skills: Strong analytical and problem-solving skills Excellent communication and interpersonal skills Ability to work independently and as part of a team CertificationCISA preferred Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: GRC Consulting. Experience5-8 Years.
Posted 2 days ago
7.0 - 12.0 years
20 - 25 Lacs
Pune
Work from Office
Mandate Skills- SIEM, PAM, Endpoint security & Vulnerability assessment. Key Responsibilities Incident Response and Management: Lead the incident response process, including identification, containment, eradication, and recovery. Analyze and respond to complex security incidents and breaches. Conduct post-incident analysis and develop reports with recommendations to prevent future incidents. Security Monitoring and Analysis: Oversee the continuous monitoring of security alerts and events. Analyze logs and data from various sources (e.g., SIEM, firewalls, EDR, IDS/IPS) to identify suspicious activity. Perform advanced threat hunting and forensic analysis. Vulnerability Management: Conduct regular vulnerability assessments. Identify, prioritize, and remediate security vulnerabilities in systems and applications. Collaborate with IT and development teams to implement security patches and updates. Security Architecture and Engineering: Design and implement security solutions to protect the organization's networks, systems, and data. Develop and maintain security policies, standards, and procedures. Evaluate and recommend new security technologies and tools. Compliance and Risk Management: Ensure compliance with relevant regulatory requirements and industry standards (e.g., ISO 27001, NIST). Perform risk assessments and develop mitigation strategies. Document and maintain security controls and frameworks. Required Skills and Qualifications Technical Expertise: Advanced knowledge of cybersecurity principles, techniques, and technologies. Proficiency in using security tools such as SIEM, IDS/IPS, firewalls, and endpoint protection solutions. Experience with vulnerability management, penetration testing, and forensic analysis. Experience: Minimum of 7-10 years of experience in cybersecurity, with at least 2-3 years in an L3 or senior role. Proven track record of handling complex security incidents and leading incident response efforts. Experience in designing and implementing security architectures and solutions. Certifications: Relevant certifications such as CISSP, CISM, CEH, GIAC, or equivalent are highly desirable. Analytical and Problem-Solving Skills: Strong analytical skills with the ability to identify and mitigate security threats. Excellent problem-solving skills and the ability to think critically under pressure. Communication and Collaboration: Strong communication skills, both written and verbal. Ability to collaborate effectively with cross-functional teams and stakeholders. Preferred Skills and Qualifications Experience with cloud security (e.g., AWS, Azure, Google Cloud). Knowledge of scripting and automation tools (e.g., Python, PowerShell). Familiarity with regulatory requirements and standards (e.g., GDPR, HIPAA).
Posted 2 days ago
4.0 - 9.0 years
14 - 24 Lacs
Mumbai
Work from Office
We are looking for someone who has good hands on experience in VAPT. This role is with one of the government department of Maharashtra. Education: B.E/B. Tech / M.Sc. (Comp. Sci) / MCA / MBA/ M. Tech degree or equivalent. Should be a certified auditor. 6 or more years of overall experience with at least 6 years of relevant experience in Vulnerability Analysis, Penetration Testing and/or forensics. Must have experience in managing at least 3 projects for large, enterprise scale Clients. should have at least two industry certifications as mentioned below: 1. Licensed Penetration Tester (LPT) 2. Certified Penetration Testing Professional (CPENT) 3. Certified Expert Penetration Tester (CEPT) 4. GIAC Penetration Tester (GPEN) 5. CompTIA PenTest+ 6. Certified Ethical Hacker (CEH) 7. Certified Mobile and Web App Penetration Tester (CMWAPT) 8. Computer Hacking Forensic Investigator (CHFI) 9. Certified Information System Auditor (CISA) 10. Certified Information Security Manager (CISM) 11. Other acceptable industry related certification in VAPT. 12. OSCP
Posted 2 days ago
8.0 - 11.0 years
35 - 37 Lacs
Kolkata, Ahmedabad, Bengaluru
Work from Office
Dear Candidate, We are hiring a Cloud Security Specialist to secure cloud infrastructure and applications across AWS, Azure, or GCP. Ideal for professionals skilled in cloud-native security controls and monitoring. Key Responsibilities: Implement cloud security policies, IAM, and encryption Monitor cloud environments for threats and misconfigurations Conduct security assessments and remediation Collaborate with DevOps and compliance teams on secure deployments Required Skills & Qualifications: Experience with AWS, Azure, or GCP security services (e.g., GuardDuty, Security Center) Knowledge of network security, IAM, and cloud audit logs Familiarity with DevSecOps practices and IaC security scanning Bonus: Certifications like AWS Security Specialty, CCSP, or AZ-500 Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Reddy Delivery Manager Integra Technologies
Posted 4 days ago
4.0 - 8.0 years
8 - 12 Lacs
Bengaluru
Work from Office
Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less
Posted 5 days ago
2.0 - 5.0 years
3 - 7 Lacs
Bengaluru
Work from Office
We're Celonis, the global leader in Process Mining technology and one of the world's fastest-growing SaaS firms. We believe there is a massive opportunity to unlock productivity by placing data and intelligence at the core of business processes and for that, we need you to join us.. The Team:. As a member of the Information Security Organization at Celonis, you'll collaborate closely with various departments and customers to communicate and demonstrate the security posture of our products. This position is part of the Security Enablement team within the broader Security GRC (Governance, Risk, and Compliance) Department. The Information Security team plays a critical role in ensuring Celonis' technology and information assets are appropriately guarded from external and internal threats. The Security GRC Department you'll be joining is responsible for maintaining existing security attestations at Celonis globally, balancing risk with appropriate controls and assessing control effectiveness.. The Role:. As Associate Security Enablement Analyst within the Information Security GRC team, you will act as a key interface between Celonis and its customers, helping to demonstrate the strength of our security posture and ensuring a smooth, informed, and confident customer journey. In this role, you’ll handle a broad range of customer-facing security activities—from responding to security questionnaires and audits, to building scalable processes and content for security communications. You’ll work closely with internal stakeholders across Legal, Operations, and Engineering, playing a critical role in reinforcing trust and transparency around our security practices. This position is ideal for someone who thrives at the intersection of security, communication, and customer success.. The work you’ll do:. Customer Security Requests: Respond quickly and accurately to customer security inquiries, supporting business development and customer success efforts.. Technical Security Communication: Independently address technical questions from customers, ensuring their security requirements are clearly understood and met.. Audit Support: Support customer audits and remote assessments by preparing and delivering relevant security documentation and evidence.. Security Questionnaires: Lead the completion of security questionnaires and related documentation, particularly those focused on cloud security.. Cross-Functional Collaboration: Work with Legal, Operations, and Cloud Engineering to develop and maintain standardized materials that clearly explain our security controls and practices.. Knowledge Management: Build and maintain a centralized knowledge base covering key Information Security topics, making resources easily accessible to internal and external stakeholders.. Enablement & Culture: Contribute to internal initiatives that strengthen Celonis’s security culture, operational maturity, and external security presence—whether through team development, internal enablement, or customer-facing improvements.. Privacy & GenAI Readiness: Collaborate with cross-functional teams to support privacy-related initiatives and emerging GenAI-related security considerations, ensuring alignment with evolving regulatory and customer expectations.. The qualifications you need:. University degree in the field of Information Technology and Management, Business Administration, or a similar field. Experience working with Security Questionnaires, IT projects, RFX. Work experience in the field of IT Security, Auditing, Cloud Security or similar. Excellent communication skills in English (spoken and written). Excellent ability to communicate with clients, relevant departments, collaborators and other relevant actors. High professional responsibility and excellent skills to work independently. Excellent skills to learn quickly and adapt to new tasks. Ability to learn topics related to Cloud, Infrastructure, and IT Security. Ability to work under pressure andin a dynamic work environment. Excellent communication skills in German (has the advantage). What Celonis Can Offer You:. Pioneer Innovation: Work with the leading, award-winning process mining technology, shaping the future of business.. Accelerate Your Growth: Benefit from clear career paths, internal mobility, a dedicated learning program, and mentorship opportunities.. Receive Exceptional Benefits: Including generous PTO, hybrid working options, company equity (RSUs), comprehensive benefits, extensive parental leave, dedicated volunteer days, and much more.. Prioritize Your Well-being: Access to resources such as gym subsidies, counseling, and well-being programs.. Connect and Belong: Find community and support through dedicated inclusion and belonging programs.. Make Meaningful Impact: Be part of a company driven by strong values that guide everything we do: Live for Customer Value, The Best Team Wins, We Own It, and Earth Is Our Future.. Collaborate Globally: Join a dynamic, international team of talented individuals.. Empowered Environment: Contribute your ideas in an open culture with autonomous teams.. About Us:. Celonis makes processes work for people, companies and the planet. The Celonis Process Intelligence Platform uses industry-leading process mining and AI technology and augments it with business context to give customers a living digital twin of their business operation. It’s system-agnostic and without bias, and provides everyone with a common language for understanding and improving businesses. Celonis enables its customers to continuously realize significant value across the top, bottom, and green line. Celonis is headquartered in Munich, Germany, and New York City, USA, with more than 20 offices worldwide.. Get familiar with the Celonis Process Intelligence Platform by watching this video.. Celonis Inclusion Statement:. At Celonis, we believe our people make us who we are and that “The Best Team Wins”. We know that the best teams are made up of people who bring different perspectives to the table. And when everyone feels included, able to speak up and knows their voice is heard that's when creativity and innovation happen.. Your Privacy:. Any information you submit to Celonis as part of your application will be processed in accordance with Celonis’ Accessibility and Candidate Notices. By submitting this application, you confirm that you agree to the storing and processing of your personal data by Celonis as described in our Privacy Notice for the Application and Hiring Process.. Please be aware of common job offer scams, impersonators and frauds. Learn more here.. Show more Show less
Posted 5 days ago
6.0 - 10.0 years
13 - 18 Lacs
Mumbai
Work from Office
Are you a Product Security Analyst expert looking for a challenging opportunity?. Join our Product Security team.. We operate at the heart of the digital transformation of our business. Our team is responsible for Product Security including application security for our global organization.. Partner with the best.. We are looking for a Lead Product Security Analyst, with a focus in Product Security. In this role, you will work in a team and demonstrate working knowledge of systems and products and how they are secured in customers' businesses.. As a Senior Lead Product Security Engineer, you will be responsible for:. Building and executing engineering processes for early detection of design flaws, vulnerabilities, weaknesses, missing security controls, and secure implementation of product features.. Applying existing technologies, approaches, methodologies in new combinations to design new products, systems, or processes. Viewed internally and externally as a specialist in the discipline.. Presenting plans, technical roadmaps, ri Senior Lead Product Security Engineer Are you a Product Security Analyst expert looking for a challenging opportunity?. Join our Product Security team.. We operate at the heart of the digital transformation of our business. Our team is responsible for Product Security including application security for our global organization.. Partner with the best.. We are looking for a Lead Product Security Analyst, with a focus in Product Security. In this role, you will work in a team and demonstrate working knowledge of systems and products and how they are secured in customers' businesses.. As a Senior Lead Product Security Engineer, you will be responsible for:. Building and executing engineering processes for early detection of design flaws, vulnerabilities, weaknesses, missing security controls, and secure implementation of product features.. Applying existing technologies, approaches, methodologies in new combinations to design new products, systems, or processes. Viewed internally and externally as a specialist in the discipline.. Presenting plans, technical roadmaps, risks and recommendations to senior business and technical leaders. Lead programs related to Product Security Incident Response, Product Inventory, etc. Driving awareness, engagement, and improvements of Product Security metrics with business leaders. Demonstrating working knowledge of systems and products and how they are secured in a customer environment.. Implementing tools to automate and scale security processes.. Providing security leadership to the business segment product security teams. Experiencing with cyber security framework (NIST 800-53, ISO 27001, IEC 62443, etc.) implementation and governance. Familiarity with cyber regulations (EU NIS2, CRA, etc). Fuel your passion. To be successful in this role you will:. Have a bachelor’s degree in computer science or “STEM” Majors (Science, Technology, Engineering, and Math).. Have a minimum of 10 years of professional experience in a STEM-related degree preferably with a Product Security / OT Security focus.. Have project management experience, and expertise with Agile development teams.. Have prior work experience with various development tools including threat modelling, vulnerability technologies, application security, and secure coding principles.. Have experience with penetration testing and ethical hacking.. Have experience securing applications within cloud platforms such as AWS, Azure, and alike.. Have experience with a broad set of information security technologies and processes within a SaaS, IaaS, PaaS, or cloud environment.. Working with us. Our people are at the heart of what we do at Baker Hughes. We know we are better when all our people are developed, engaged and able to bring their whole authentic selves to work. We invest in the health and well-being of our workforce, train and reward talent and develop leaders at all levels to bring out the best in each other.. Working for you. Our inventions have revolutionized energy for over a century. But to keep going forward tomorrow, we know we must push the boundaries today. We prioritize rewarding those who embrace change with a package that reflects how much we value their input. Join us, and you can expect:. Contemporary work-life balance policies and wellbeing activities. Comprehensive private medical care options. Safety net of life insurance and disability programs. Tailored financial programs.. Additional elected or voluntary benefits. About Us:. We are an energy technology company that provides solutions to energy and industrial customers worldwide. Built on a century of experience and conducting business in over 120 countries, our innovative technologies and services are taking energy forward – making it safer, cleaner and more efficient for people and the planet.. Join Us:. Are you seeking an opportunity to make a real difference in a company that values innovation and progress? Join us and become part of a team of people who will challenge and inspire you! Let’s come together and take energy forward.. Baker Hughes Company is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law.. R136394. Show more Show less
Posted 5 days ago
4.0 - 8.0 years
8 - 12 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less
Posted 5 days ago
4.0 - 8.0 years
8 - 12 Lacs
Hyderabad
Work from Office
Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less
Posted 5 days ago
4.0 - 8.0 years
8 - 12 Lacs
Mumbai
Work from Office
Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less
Posted 5 days ago
3.0 - 6.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Location/s: Bengaluru. Recruiter contact: Supriya Yadavalli. Mott MacDonald is a global engineering, management, and development consultancy with over 20,000 employees across more than 50 countries and 140+ offices.. We work across incredible global industries, delivering exciting work that is defining our future and making an important societal impact in the communities we serve. Our people power our performance – we succeed when they do. With countless opportunities to collaborate, learn, and grow, the possibilities for excellence are as varied as every individual.. Whether you want to grow as a subject matter expert or broaden your experience with roles across our international community, you’re surrounded by global specialists who want to combine their expertise and champion you to be your best. As a proudly employee-owned business, we benefit our clients, our communities, and each other, investing in creating the right space for everyone to feel empowered, included, and valued. Whatever your ambition, Mott MacDonald is where people come to be brilliant.. About The?business?unit. Mott MacDonald’s support services are the driving force behind our organisation enabling us to run efficiently and effectively. The team works collaboratively to offer specialist advice, best practice and technology to all areas of our business specifically designed for our global reach.. Job Description. Working as an IT Specialist in Cyber Security you will assist and advise the IT Manager for Cyber Security regarding Risk Analysis and Remediation. Risk Analysis and Remediation Service Desk analyst you will be the first point of contact for all employees seeking to resolve IT issues. Speedy and intelligent resolution of IT incidents is the key to ensuring that Mott MacDonald can deliver on its promises to its clients.. Key Duties And Responsibilities Include. Proactively seeking out the most effective means of monitoring information security related activities, by use of existing tools, or the investigation of new tools and methods. Developing and adopting appropriate Risk Assessment methodologies to ensure we are correctly prioritizing the risks we have identified.. Assist in the monitoring and resolution of all Information Security issues as they occur, driving through forensic investigation and remediation as appropriate.. Feedback all lessons learned into Operational and/or Governance systems.. Drive and support information security related change in Operational teams. Governance. Advice on appropriate security posture (approach, risks, technical measures, awareness) from the point of view of the business (both overall and specific teams). Assist with driving cultural change in the organization by helping people understand risks and make better choices to address enterprise security weaknesses.. Communications. Responsible for working with BMS and IT teams to communicate to the business and IT on known threats and best practices for information security, as they evolve.. Operational. Advice on all requirements around information security and appropriate use of specific systems or services, both those provided by IT or as required by the business, including projects with special security requirements and setup.. Acting as a point of contact for Information Security champions within operational IT teams, advising on appropriate responses, escalation as required.. Supervise the development of and relationship with the (planned) Security Operations Centre. Help to ensure that risk is measured and understood effectively by operational teams.. Penetration testing and vulnerability assessments. Assist with prioritisation of security controls and remediation.. Architecture. Review and recommend tools and processes for managing information security around new and existing systems.. Price out solutions and advise on the best risk solution portfolio.. Identify, review and evaluate technology risk.. Input to design choices for new systems to ensure security is addressed appropriately.. Scan and provide feedback on new products and risks to inform management strategy.. Essential. Candidate Specification:. Demonstrable experience of business operations and processes in a large multinational or global organisation. In-depth understanding of the Office 365 platform and Microsoft Windows Domain environment. In-depth understanding of modern cloud and network technologies and protocols. Demonstrate appreciation for user-centred design, experience, and usability. Experience with mobile applications. Working knowledge of international data privacy, data residency, and information security requirements. Desirable. High degree of understanding of the evolving global and internal IT environments. Knowledge of all Threat areas (deliberate, accidental, internal, external). Extensive experience of the ISO 27001 Information Security Management framework. Understanding of Cyber Essential Plus and similar government security standards. Personal Attributes. Passionate about technology and learning.. Ability to balance demands and priorities and think clearly under pressure.. Attention to detail and a focus on quality.. Excellent conflict resolution, communication, and collaboration skills.. Logical and analytical approach to solving problems.. We Can Offer (subject To Company’s Policy). Agile and safe working environment. Competitive annual leave and sick leaves. Group incentive scheme. Group term life insurance, Workmen’s compensation and Group medical insurance coverage. Short and Long-term Global employment opportunities. Global collaboration and knowledge sharing. Digital Innovation and Transformation. Equality, diversity and inclusion. We put equality, diversity and inclusion at the heart of our business, seeking to promote fair employment procedures and practices to ensure equal opportunities for all. We encourage individual expression in our workplace and are committed to creating an inclusive environment where everyone feels they have the opportunity to contribute.. Agile working. At Mott MacDonald, we believe it makes business sense for you and your manager to choose how you can work most effectively to meet your client, team and personal commitments. We embrace agility, flexibility and trust.. Location(s):. Bengaluru, KA, IN. Contract Type: Permanent. Work Pattern: Full Time. Market: Various. Discipline: Information technology. Job Ref: 9069. Recruiter Contact: Supriya Yadavalli. Show more Show less
Posted 5 days ago
2.0 - 5.0 years
7 - 11 Lacs
Gurugram
Work from Office
About NCR Atleos Key Responsibilities Security Administration Design, Engineer and manage security solutions.Configure, monitor, and troubleshoot systems to ensure optimal performance and security.Plan and execute upgrades, patches, and other maintenance activities for security tooling.Collaborate with the cybersecurity team to ensure robust security measures and compliance with industry standards.Technical Support and Troubleshooting:Provide advanced technical support for AWS cloud networking issues.Mentor and guide junior engineers and IT support staff. Documentation and Reporting Create and maintain comprehensive documentation of configurations, procedures, and processes.Generate regular reports on system performance, security incidents, and maintenance activities. Qualifications Education :Bachelors degree in computer science, Information Technology, Cybersecurity, or a related field; or equivalent work experience. Experience :At least 3 years of hands-on experience in Cyber Security. Technical Skills: Strong understanding of network protocols and services (TCP/IP, DNS, VPN, etc.).Knowledge of scripting languages (PowerShell, Python) for automation. Key Competencies Problem-Solving Skills: Strong analytical and troubleshooting abilities to diagnose and resolve complex technical issues. Communication Skills: Excellent verbal and written communication skills, with the ability to explain technical concepts to non-technical stakeholders. Project Management Ability to manage multiple projects and priorities in a fast-paced environment. EEO Statement NCR Atleos is an equal-opportunity employer. It is NCR Atleos policy to hire, train, promote, and pay associates based on their job-related qualifications, ability, and performance, without regard to race, color, creed, religion, national origin, citizenship status, sex, sexual orientation, gender identity/expression, pregnancy, marital status, age, mental or physical disability, genetic information, medical condition, military or veteran status, or any other factor protected by law. Statement to Third Party Agencies To ALL recruitment agenciesNCR Atleos only accepts resumes from agencies on the NCR Atleos preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Atleos employees, or any NCR Atleos facility. NCR Atleos is not responsible for any fees or charges associated with unsolicited resumes.
Posted 5 days ago
3.0 - 6.0 years
6 - 11 Lacs
Gurugram
Work from Office
About NCR Atleos Responsible for planning and performing Application Risk Assessments, as per the guidelines provided by regulations and standards. Build expertise on security governance and compliance that includes all Cloud providers and Cloud security monitoring. Build tool expertise on tools - Wiz, Algosec, Fortinet, Forscout, etc. Effectively collaborates and communicates with the stakeholders and ensure satisfaction Foster teamwork. Train and coach team members to ensure effective knowledge management activity. EEO Statement NCR Atleos is an equal-opportunity employer. It is NCR Atleos policy to hire, train, promote, and pay associates based on their job-related qualifications, ability, and performance, without regard to race, color, creed, religion, national origin, citizenship status, sex, sexual orientation, gender identity/expression, pregnancy, marital status, age, mental or physical disability, genetic information, medical condition, military or veteran status, or any other factor protected by law. Statement to Third Party Agencies To ALL recruitment agenciesNCR Atleos only accepts resumes from agencies on the NCR Atleos preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Atleos employees, or any NCR Atleos facility. NCR Atleos is not responsible for any fees or charges associated with unsolicited resumes.
Posted 5 days ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
19947 Jobs | Dublin
Wipro
9475 Jobs | Bengaluru
EY
7894 Jobs | London
Accenture in India
6317 Jobs | Dublin 2
Amazon
6141 Jobs | Seattle,WA
Uplers
6077 Jobs | Ahmedabad
Oracle
5820 Jobs | Redwood City
IBM
5736 Jobs | Armonk
Tata Consultancy Services
3644 Jobs | Thane
Capgemini
3598 Jobs | Paris,France