Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 5.0 years
7 - 11 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 month ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 month ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 month ago
5.0 - 8.0 years
5 - 9 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 month ago
7.0 - 11.0 years
16 - 20 Lacs
bengaluru
Work from Office
This Position reports to: IS Service Owner You will be mainly accountable for: Ensures that the IS solutions/services provides the required functionality, meet the expectations of business and are reliable, maintainable, compliant, and auditable. Manages/monitors software development and analyses data to continually improve solution. Collaborates with and contributes to project setup and delivery and to service operations optimization. Accountable to approve, sign-off, and build any solution to be implemented on ABB production environment, within the respective service line, ensuring required quality and safety standards. Defines the technical IS solution and ensures alignment with other mod...
Posted 1 month ago
5.0 - 6.0 years
6 - 8 Lacs
lucknow
Work from Office
Reporting to Programme Specialist (Resilience), the GIS and Spatial Modelling Analyst will provide advanced geospatial and analytical support to strengthen disaster risk reduction (DRR), planning, and decision-making efforts in the state. The role involves developing and managing geospatial databases, conducting spatial risk assessments, supporting HRVA and Disaster Management Plan (DMP) preparation, and facilitating integration with the states disaster MIS. The expert will work closely with UPSDMA, UPDESCO, RAHAT , and technical specialists to ensure the use of cutting-edge geospatial tools, models, and data for effective planning, monitoring, and response. Duties and Responsibilities: (A) ...
Posted 1 month ago
6.0 - 11.0 years
30 - 35 Lacs
noida, chennai
Work from Office
HCL Tech uses Qualys tools for various roles, including those in security, infrastructure management, and penetration testing. Job descriptions often specify experience with Qualys tools, such as vulnerability scanning and configuration management , and may also require proficiency in other security technologies and certifications like CEH. 1. Security Roles: Vulnerability Assessment and Penetration Testing (VAPT): HCL Tech uses Qualys tools for identifying vulnerabilities in systems and applications. VAPT Testers need experience with Qualys and other penetration testing tools. Security Operations Engineer: This role involves implementing and managing security measures, including those relat...
Posted 1 month ago
3.0 - 5.0 years
4 - 8 Lacs
bengaluru
Work from Office
We are looking for a skilled PHP ReactJS Engineer with 6 to 10 years of experience to join our team at Wipro Limited, located in Bengaluru. The ideal candidate will have expertise in software services and proficiency in PHP and ReactJS. Roles and Responsibility Design, develop, and maintain high-quality software applications using PHP and ReactJS. Collaborate with cross-functional teams to identify and prioritize project requirements. Develop and implement new features and functionalities in existing software applications. Troubleshoot and resolve technical issues efficiently. Participate in code reviews and contribute to improving overall code quality. Stay updated with industry trends and ...
Posted 1 month ago
4.0 - 8.0 years
20 - 25 Lacs
bengaluru
Work from Office
This Position reports to: BU Digital Leader Your role and responsibilities: In this role, you will have the opportunity to define and implement ABBs cybersecurity strategy aligned with the overall strategy and business needs. Each day, you will manage cybersecurity risks that could affect the ABB brand and customer base for all ABB offerings, in a cost-effective way. You will also showcase your expertise by collaborating with businesses to protect and grow revenue by effectively addressing customer cybersecurity expectations and actively driving cybersecurity opportunities and demand. The work model for the role is: #LI-Onsite This role is contributing to the Motion Business in Service divis...
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Shift Time : Regular Shift. ( 8AM to 5:30 PM) Support Engineer SailPoint L2,L3 support roles involve tackling the most intricate issues within the Identity and Access Management (IAM) domain, particularly concerning SailPoint IdentityIQ. Deep understanding of SailPoint's functionality, including its integrations with systems such as Active Directory, LDAP, and various applications. Should take responsibility for resolving escalated technical problems, conducting root cause analysis, and collaborating with development and engineering teams for the fixes and enhancements. Key Responsibilities Advanced troubleshooting and issue resolution. In-depth root cause analysis. Collaborating with develo...
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 month ago
6.0 - 10.0 years
8 - 12 Lacs
telangana
Work from Office
Apenetration testing (PenTest) and disaster recovery (DR) test job description typically requires candidates to have expertise in both cybersecurity and business continuity. The role involves conducting authorized simulated attacks to identify vulnerabilities in systems and infrastructure, developing and testing DR plans, and providing recommendations for improvement. Penetration Testing (PenTest) Responsibilities : Vulnerability Assessment: Identify weaknesses in computer systems, networks, and applications. Simulated Attacks: Perform ethical hacking exercises to mimic real-world attacks. Reporting and Recommendations: Document findings and provide actionable recommendations for remediation...
Posted 1 month ago
9.0 - 12.0 years
27 - 35 Lacs
telangana
Work from Office
Secondary skill Experience with security tools and technologies (e.g., SIEM, IDS/IPS, firewalls). Familiarity with DevSecOps practices. Missions We are seeking a skilled Cloud Security Analyst to join our team. The ideal candidate will have extensive experience in cloud security, particularly with Azure, AWS, and Microsoft 365 (M365). This role involves ensuring the security of our cloud infrastructure, identifying and mitigating risks, and implementing best practices to protect our data and systems Design, implement, and manage security measures for cloud environments (Azure, AWS, M365). Monitor cloud infrastructure for security breaches and respond to incidents. Conduct regular security as...
Posted 1 month ago
6.0 - 11.0 years
8 - 14 Lacs
hyderabad
Work from Office
Experience 6+ Years Skill SIEM Notice Period Immediate Employment Type Contract Work Mode WFO/Hybrid 6 years of SIEM, or SOC experience Strong communication, written, and verbal skills Experience with writing/creation of formal documentation such as reports, slide decks, and architecture diagrams Customer service/support experience Ability to conduct in-depth forensic analytical studies and investigations Role Preferences Splunk certification Coding or scripting experience Strong knowledge of Unix/Linux Security+, GIAC, SSGB, ITIL, or similar certification Working knowledge of applicable industry controls such as NIST 800-536 or Mitre Attack Framework
Posted 1 month ago
10.0 - 15.0 years
5 - 8 Lacs
hyderabad
Work from Office
We have Immediate Openings on VulnerabilityManagement Contract to Hire role for multiple clients. Job Details Skills VulnerabilityManagement JD Primary & Secondary Skills Vulneribility ManagementQualys GuardQualys AgentPolicy ComplianceVulneribilty Scanning RESPONSIBILITIES Perform vulnerability assessment using leading Vulnerability Scanning solutions like Qualys, Microsoft Defender, etc. Perform vulnerability assessments on On-prem, Cloud hosted systems, container (like Docker & Kubernetes), databases, web services and other widely deployed infrastructure components. Perform false positive validation and ensure delivery of quality reports. Act as a technical SME to analyse the vulnerabilit...
Posted 1 month ago
15.0 - 20.0 years
13 - 17 Lacs
gurugram
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Operation Automation Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to as...
Posted 1 month ago
2.0 - 6.0 years
4 - 8 Lacs
bengaluru
Work from Office
Wipro Limited (NYSE:WIT, BSE:507685, NSE:WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role : Role Purpose The purpose of this rol...
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
pune
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is ...
Posted 1 month ago
5.0 - 8.0 years
7 - 10 Lacs
mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 month ago
2.0 - 6.0 years
4 - 8 Lacs
hyderabad
Work from Office
About The Role : Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of se...
Posted 1 month ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 month ago
3.0 - 6.0 years
8 - 12 Lacs
gurugram
Work from Office
This role is responsible for analyzing activities relating to monitoring and responding to security events. This role receives, researches, triages and documents all security events and alerts as they are received. This individual supports multiple security-related platforms and technologies, interfacing with others within the IT organization, as well as other internal business units and external customers/partners. Events will be generated from endpoints, networks, security information and event management (SIEM) systems, threat intelligence platforms, employees, third-parties and other sources. This role also receives information sharing and analysis center (ISAC) information and is expect...
Posted 1 month ago
1.0 - 4.0 years
5 - 9 Lacs
gurugram
Work from Office
Bill Gosling Outsourcing is looking for Executive Information Security to join our dynamic team and embark on a rewarding career journey Assisting with the preparation of operating budgets, financial statements, and reports. Processing requisition and other business forms, checking account balances, and approving purchases. Advising other departments on best practices related to fiscal procedures. Managing account records, issuing invoices, and handling payments. Collaborating with internal departments to reconcile any accounting discrepancies. Analyzing financial data and assisting with audits, reviews, and tax preparations. Updating financial spreadsheets and reports with the latest availa...
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
81102 Jobs | Dublin
Wipro
28851 Jobs | Bengaluru
Accenture in India
24265 Jobs | Dublin 2
EY
21926 Jobs | London
Uplers
15950 Jobs | Ahmedabad
IBM
15060 Jobs | Armonk
Bajaj Finserv
14778 Jobs |
Amazon.com
14002 Jobs |
Accenture services Pvt Ltd
13694 Jobs |
Capgemini
13629 Jobs | Paris,France