Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 8.0 years
0 Lacs
Kolkata, Barasat, Baruipur
Work from Office
Manage audits - plan to finish Background 3 yrs in Telecom software/Protocol, Embedded systems, Mobile Device & Mobile Applications, IOT Blockchain, Artificial Intelligence, UAS software systems, applications /IT system /Software product test Required Candidate profile UG : B.Tech/B.E in degree in Electronics, Computer Science, IT Experience in Developing software or firmware related to UAS or automotive or IoT products.
Posted 2 months ago
4.0 - 9.0 years
0 Lacs
karnataka
On-site
As a Technical Writer at PwC, your primary responsibility will be to work as part of a team in producing high-quality documentation for threat actor simulation services, device and application assessments, and penetration test results. You will collaborate closely with the business team to gather information and understand documentation requirements. Your role will involve creating, editing, and maintaining documentation for penetration testing reports, procedures, guidelines, and standards. It is essential to explain complex technical concepts clearly and concisely, tailoring the content to various audiences, including both technical and non-technical stakeholders. Staying updated on the la...
Posted 2 months ago
3.0 - 7.0 years
0 Lacs
navi mumbai, maharashtra
On-site
The main objective of this role is to analyze, identify, rectify & recommend specific improvement measures to enhance the security posture of the organization and safeguard sensitive information. The responsibilities include ensuring customer-centric cybersecurity, monitoring and safeguarding log sources and security access, planning for disaster recovery in case of security breaches, monitoring for attacks and intrusions, conducting log reviews, forensic analysis, and security assessments. The role also involves handling security incidents escalated by the L1 team in 24x7 rotational shifts, utilizing advanced analytics tools to identify emerging threat patterns and vulnerabilities, completi...
Posted 2 months ago
2.0 - 6.0 years
0 Lacs
navi mumbai, maharashtra
On-site
You have a fantastic opportunity to join our team as a SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting professional with a minimum of 2 years of relevant experience. As a part of our team, you will be responsible for conducting Vulnerability assessment & Penetration testing (VAPT) as per the bank's regulatory and operational requirements. This includes External Penetration Testing of Bank's internet-facing Web, Mobile, Web services, Network, and Infrastructure on a periodic basis as per Bank's provided schedules. Your key roles and responsibilities...
Posted 2 months ago
3.0 - 5.0 years
5 - 7 Lacs
Bengaluru
Work from Office
We are seeking a skilled and experienced Attack Surface Reduction Analyst with a strong background in penetration testing to join our cybersecurity team. The successful candidate will be responsible for identifying potential security risks and vulnerabilities in our organizations systems, applications, and networks, performing penetration testing, and facilitating and managing third-party penetration testing engagements. WHO YOU LL WORK WITH Attack Surface Reduction team helps and contribute to improve the security posture of H&M by operating within an Agile model. We play a crucial role in proactively identifying and help in mitigating potential security risks and vulnerabilities across H&M...
Posted 2 months ago
3.0 - 8.0 years
5 - 10 Lacs
Pune
Work from Office
What you ll do: This security analyst will be part of a team tasked with identifying, tracking and verifying the remediation of vulnerabilities in internal and external applications and systems. This role involves performing deep-dive analysis of vulnerabilities, operating vulnerability scanning tools, and building relationships with other groups within the IT organization. You will work closely with IT infrastructure, product teams, supply chain, and Cyber Security operations to reduce Eatons attack surface. Stay up to date with the evolving technological and threat landscape and its potential impact on modern and legacy technologies, applications, and business processes. Monitor for vulner...
Posted 2 months ago
2.0 - 6.0 years
0 Lacs
thane, maharashtra
On-site
We are searching for an experienced VAPT professional to join our cybersecurity team. You should possess a solid background in recognizing, evaluating, and mitigating security vulnerabilities in network and application environments through thorough penetration testing and vulnerability assessments. ProTechmanize Solutions, an Information Technology product and services company, founded by professionals with over 20 years of collective experience in Cyber Security, Information Technology, IT Security & Software Development, is where you will be working. The ProTechmanize team is dedicated to offering the right solutions and services to customers through customized programs. Your responsibilit...
Posted 2 months ago
2.0 - 6.0 years
5 - 12 Lacs
Noida, Gurugram
Hybrid
>> Job Description Experience: 3+ years with at-least 2-3 years in client facing advisory consulting role and managing a medium sized team Preferred Certifications: CEH, ECSA, OSCP, CISSP, CCSK, OCSE, CCSP, AWS Security Desired skill set: 1. Strong understanding of IT security standards and frameworks (OWASP, NIST, CIS) 2. Strong understanding of security risks in networks and application platforms 3. Strong understanding of network security, infrastructure security and application security 4. Strong understanding of OSI, TCP/IP model and network basics 5. Demonstrate technical penetration testing skills on IT infrastructure, web applications, mobile platforms and Red teaming 6. Strong techn...
Posted 2 months ago
4.0 - 6.0 years
7 - 11 Lacs
Pune
Work from Office
As a Senior Network Security Specialist at Incedo, you will be responsible for managing and maintaining client network security. Your duties will include implementing security protocols, monitoring security logs, conducting vulnerability assessments, collaborating with other teams to manage risk, and providing security recommendations. Roles & Responsibilities: Designing and implementing network security strategies. Identifying and mitigating network security threats and vulnerabilities. Configuring and managing security devices such as firewalls and intrusion detection systems. Conducting security audits and assessments. Collaborating with other IT teams to ensure security policies and proc...
Posted 2 months ago
2.0 - 6.0 years
5 - 9 Lacs
Kochi
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
0.0 - 2.0 years
2 - 4 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
Expect more. Connect more. Be more at Diebold Nixdorf. Our teams automate, digitize, and transform the way more than 75 million people around the globe bank and shop in this hyper-connected, consumer-centric world. Join us in connecting people to commerce in this vital, rewarding role. Supports the full cycle of vulnerability management: from discovery / asset identification through risk assessment, remediation, verification and reporting. Works with Information Security, engineering, other technical and product / operational stakeholders to ensure understanding of and commitment to relevant vulnerability standards and practices. Proactively monitors system, network and other changes to ensu...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
0.0 - 2.0 years
0 Lacs
Chennai
Work from Office
Key Responsibilities: Monitor, triage, and document security incidents; escalate them based on severity and business impact. Conduct daily log reviews and analyze event data to detect potential security threats. Assist in vulnerability scanning activities and coordinate with internal/external teams for Vulnerability Assessment and Penetration Testing (VA/PT). Track and follow up on open vulnerabilities to ensure timely remediation. Maintain accurate documentation, dashboards, and reports related to incident response activities. Support internal audits and compliance initiatives aligned with standards such as ISO/IEC 27001, GDPR, and PDPA. Contribute to the development and maintenance of secu...
Posted 2 months ago
11.0 - 14.0 years
30 - 35 Lacs
Bengaluru
Work from Office
Microland Limited is looking for Associate Manager - Cyber Security to join our dynamic team and embark on a rewarding career journeyTeam Supervision: Provide leadership, direction, and supervision to a team of employees, ensuring their productivity, performance, and professional development.Operational Management: Manage day-to-day operations within the assigned area, ensuring efficiency, adherence to processes, and effective resource allocation.Performance Management: Set performance goals, conduct regular performance reviews, and provide feedback and coaching to team members to help them excel in their roles.Project Coordination: Oversee projects, initiatives, or tasks within the departme...
Posted 2 months ago
3.0 - 5.0 years
5 - 7 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
3.0 - 5.0 years
5 - 7 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
2.0 - 6.0 years
4 - 8 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do: Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents...
Posted 2 months ago
5.0 - 8.0 years
7 - 10 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do: Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents...
Posted 2 months ago
5.0 - 8.0 years
7 - 10 Lacs
Mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do: Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
Chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
Mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
81102 Jobs | Dublin
Wipro
28851 Jobs | Bengaluru
Accenture in India
24265 Jobs | Dublin 2
EY
21926 Jobs | London
Uplers
15950 Jobs | Ahmedabad
IBM
15060 Jobs | Armonk
Bajaj Finserv
14778 Jobs |
Amazon.com
14002 Jobs |
Accenture services Pvt Ltd
13694 Jobs |
Capgemini
13629 Jobs | Paris,France