Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
7.0 - 11.0 years
0 Lacs
pune, maharashtra
On-site
The role requires an experienced individual with 7-9 years of expertise in IT change management, security, or related domains. As part of the responsibilities, you will be expected to handle IT change requests and workflows efficiently. Additionally, you must possess knowledge of monitoring and addressing IT security reports to ensure the organization's security risk management. Understanding regulatory and audit requirements related to IT changes and security is crucial for this role. Coordinating system updates and patching processes will also fall under your purview, hence experience in this area is essential. Alongside, you should demonstrate the ability to maintain comprehensive documentation and generate relevant reports for effective communication. Moreover, having experience in vendor management to mitigate risks is considered a good-to-have skill. Possessing security certifications such as CISSP, CISM, or similar will be advantageous. Familiarity with the ITIL framework for change management and service delivery is also beneficial. Experience with security tools, especially vulnerability management and patch management tools, will further enhance your profile. UST, a renowned global digital transformation solutions provider, is seeking a proficient professional to join their team in Pune. With over 30,000 employees across 30 countries, UST collaborates closely with leading companies worldwide to drive significant transformation. By combining technology, human-centric approaches, and a strong sense of purpose, UST empowers its clients from design to operation. Deep domain expertise, innovation, and agility are the pillars on which UST operates, ensuring the infusion of new ideas and strategies within their clients" organizations. Join UST on a journey of boundless impact, touching billions of lives along the way.,
Posted 1 day ago
7.0 - 11.0 years
0 Lacs
chennai, tamil nadu
On-site
As a Senior Healthcare Business Analyst at CitiusTech, you will be a part of an Agile team designing and building healthcare applications, implementing new features, and ensuring adherence to the best coding development standards. Your responsibilities will include delivering technical preliminary design documents, conducting detailed analysis of data systems to solve complex business problems in an agile environment, providing consulting support for IT and Business partners, meeting defined deadlines with a high level of quality, creating system test plans and test data, participating in deliverables required by approved Development Lifecycles, creating various types of documentation, performing testing, and adhering to IT and corporate policies, procedures, and standards. With 7-8 years of experience, you will be based in either Mumbai, Pune, or Chennai. An Engineering Degree (BE/ME/BTech/MTech/BSc/MSc) and technical certification in multiple technologies are required. Relevant industry-recognized certifications related to project management such as CSPO, PMP, Agile PM, SAFe are desirable. Mandatory technical skills include US Healthcare domain knowledge, strong SQL knowledge, experience in data warehouse and data management projects, collaboration with DBA and DB developers, working on creating BRD, FRDs, UML, and flow diagrams, facilitating business requirement elicitation sessions, identifying potential issues and risks, and more. Good attitude, experience in Agile model, excellent communication skills, and adherence to departmental policies and procedures are essential. Good to have skills include experience as a Development/Data Analyst, Data Warehousing, working with tools like Microsoft Project, Jira, and Confluence, strategic thinking, and knowledge of vulnerability and security domain. CitiusTech is committed to combining IT services, consulting, products, accelerators, and frameworks with a client-first mindset and next-gen tech understanding to humanize healthcare and make a positive impact on human lives. The company values Passion, Respect, Openness, Unity, and Depth (PROUD) of knowledge, creating a fun, transparent, non-hierarchical, diverse work culture focused on continuous learning and work-life balance. Rated as a Great Place to Work, CitiusTech offers comprehensive benefits to ensure a long and rewarding career. The EVP "Be You Be Awesome" reflects the company's efforts to create a great workplace supporting employee growth, well-being, and success. By collaborating with global leaders at CitiusTech, you will have the opportunity to shape the future of healthcare and positively impact human lives.,
Posted 2 days ago
2.0 - 6.0 years
0 Lacs
maharashtra
On-site
As a Technical Support Specialist in Email Security, you will be responsible for providing customer support through various channels such as calls, emails, and remote sessions to ensure 100% customer satisfaction. Your key responsibilities will include managing Cisco Ironport / Cisco ESA, Symantec Message Gateway for Email Threat Prevention, and preventing unwanted emails using Adaptive Reputation, Anti-Spam Policies, and AntiMalware Policies. Additionally, you will need to track and rectify any information security deficiencies and vulnerabilities identified through audits, reviews, and monitoring activities. Your role will also involve closely monitoring the infrastructure, compiling information from various sources for analysis, and ensuring high availability as required. The ideal candidate should possess strong technical acumen, with prior experience in information security, cloud infrastructure, endpoint security, and vulnerability management. Experience in Email Security concepts would be an added advantage. Strong verbal and written communication skills are essential for effective interaction with clients and team members. To excel in this role, you must demonstrate enthusiasm and a hunger for learning, be proactive in self-training, and exhibit a willingness to adapt to new technologies and processes. If you are a graduate or post-graduate with 2-6 years of relevant experience and hold a certification in any Email Security related solution, we encourage you to apply. If you have any queries or require further information, please feel free to contact us at +91 8976772985.,
Posted 2 days ago
3.0 - 5.0 years
15 - 30 Lacs
Coimbatore
Work from Office
Function Goal : To support the organization's information security efforts by assisting with the monitoring and initial analysis of security threats, providing support in risk management activities, and helping ensure compliance with security policies to protect the organization's information assets. Key Result Areas : Assist in the development, review, and maintenance of security policies and procedures and provide support for security-related documentation to ensure robust security frameworks are in place. Ensure compliance with relevant security standards and regulatory requirements and participate in internal and external security audits to ensure the organization meets all necessary guidelines. Assist in the development and implementation of new security initiatives and technologies. Provide support for security-related projects, including planning, execution, and monitoring. Coordinate with project teams to ensure security requirements are met. Monitor and assess the effectiveness of security training programs. Promote best practices and educate staff on security policies and procedures. Create and distribute security awareness materials, such as security bulletins, phishing simulations and posters to ensure all employees are well-informed and vigilant and have a high level of security awareness. Assist in identifying potential security risks and vulnerabilities within the organization's systems and processes. Participate in the evaluation of risks by analyzing the likelihood and potential impact of security threats. Use tools and techniques to document identified risks and share findings with senior team members for further analysis to ensure proactive risk management. Participate in training and development opportunities to enhance security skills and knowledge. Provide feedback on existing security processes and suggest improvements to enhance effectiveness and to ensure continuous improvement of security measures.
Posted 3 days ago
0.0 - 5.0 years
10 - 11 Lacs
Bengaluru
Work from Office
Job Title: Cyber Threat Intelligence Analyst Job Location: UniOps Bangalore ABOUT UNILEVER: Be part of the world s most successful, purpose-led business. Work with brands that are well-loved around the world, that improve the lives of our consumers and the communities around us. We promote innovation, big and small, to make our business win and grow; and we believe in business as a force for good. Unleash your curiosity, challenge ideas and disrupt processes; use your energy to make this happen. Our brilliant business leaders and colleagues provide mentorship and inspiration, so you can be at your best. Every day, nine out of ten Indian households use our products to feel good, look good and get more out of life giving us a unique opportunity to build a brighter future. Every individual here can bring their purpose to life through their work. Join us and you ll be surrounded by inspiring leaders and supportive peers. Among them, you ll channel your purpose, bring fresh ideas to the table, and simply be you. As you work to make a real impact on the business and the world, we ll work to help you become a better you. ABOUT UNIOPS: Unilever is one of the world s leading consumer goods companies with operations in over 190 countries and serving 3. 4 billion consumers every day. Unilever delivers best in class performance with market making, unmissably superior brands which include Dove, Knorr, Domestos, Hellmann s, Marmite and Lynx. Our strategy beings with a purpose that places our consumers at the heart of everything we do, Brighten everyday life for all . Role Purpose: This role will support the Cyber Threat Intelligence (CTI) team in proactively collecting cyber security information and events and converting them into actionable intelligence that will be used by various technologies and stakeholders for securing Unilever. The ideal candidate will have a strong understanding of cyber threat intelligence processes, tools, and technologies, and will play a key role in identifying, analysing, and reporting on cyber threats that could impact our organization. Role Summary: The Threat Intel Analyst will play a key role in identification, interpretation, transformation, and dissemination of threat intelligence crucial to the protection of Unilever. The candidate will support the daily operations of the CTI team in areas ranging from Strategic, Tactical and Operational intelligence. The role should possess analytical skills to be able to assess and prioritize signals from the noise to ensure resources are utilized optimally at CTI and dependent teams. This role involves continuous monitoring of the threat landscape, profiling threat actors and malware, tracking vulnerabilities, and the production of actionable intelligence to support decision-making, and keeping the stakeholders informed of threats that could have an adverse impact on the organization. The role is key to transforming the produced intelligence to cater to audiences ranging from technical to business stakeholders. This role is also crucial to Unilevers overall cyber threat management efforts, as it helps to drive the right focus on cyber threats and instilling confidence that adequate countermeasures in line with the NIST Cyber Security Framework (version 2. 0). Main Accountabilities Threat Profiling: Monitor surface, deep and dark web for cyber threats impacting the manufacturing sector and Unilever in specific. Ensure 0-days and critical vulnerabilities are analysed and raised with the Threat and Vulnerability Management team to identify exposure and drive remediation. Support campaigns with the human risk team to increase threat awareness across the organization. Tools and Technology Management Work with Security Engineering team to maintain the technology stack used by the CTI team. Drive innovative integrations using the existing toolsets to automate workflows resulting in efficient ways of working. Incident Response Support: Work with the Security Operations Centre (SOC) and Cyber Emergency Response Team (CERT) in supporting them with cyber investigations. Enrich and contextualize threat intelligence to support the investigations and containment efforts. VIP Protection Support investigations to ensure scams and frauds against / impersonation Executives are thwarted in a quick and efficient manner. Support in creation of digital footprints for Executives to create awareness about their sensitive information present in publicly accessible forums. Metrics and Reporting (Including Cloud Resilience): Create and maintain cyber threat intelligence content in Unilever s central collaboration spaces. Collaborate with Unilever s Cyber Security Analytics (CSA) team for alignment on reporting of CTI metrics. Key Skills and Relevant Experience Skills: The role is highly responsive, and responsible for identification, analysis, processing, and distribution of intelligence related to threats and vulnerabilities. Stay up to date on the threat landscape. Excellent analytical, problem solving and presentation skills with a flair for technical aspects of cyber security. Prioritize and use information derived from open and commercial intelligence disciplines to determine new / changes in actor activity, capabilities, intent, and resources. Lead research efforts tracking threats and actors across industry verticals Performing and adding structured intelligence analysis to the Threat Intelligence Platform (TIP). Technical analysis of Tactics, Techniques and Procedures (TTPs) used in cyber incidents and campaigns: Analyzing attack vectors, finding adversary infrastructure, establishing intrusion chain, structured documentation of findings on the TIP. Focus on integration and automation of threat intelligence to security tools using STIX / TAXII Providing Intelligence support to Incident Response teams in Security Operations, Cyber Security teams and Business stakeholders. Engage with IT and Security teams to apprise them of threats to the technology landscape and drive remediation. Producing intel reports on incidents, campaigns and emerging threats for technical and Executive audience. Usage of AI to simplify and automate CTI activities with working knowledge of automation using API integrations and webhooks. Experience: Minimum 4 5 years of experience in Information / Cyber Security domain with at least 3 years as Threat Intelligence Analyst. Strong experience analyzing and synthesizing actionable threat intelligence via open-source tools. Solid understanding of threat intelligence lifecycle, cyber kill chain and Mitre ATT&CK framework. Experience with cloud platforms (Azure, Google Cloud) and their resilience features. Solid understanding of network and endpoint security concepts in on-prem and cloud environments. Solid understanding of vulnerabilities, how they affect systems, organizations and their corresponding context and severity (CVEs, CVSS, CPE and vulnerability disclosures). Ability to identify, create, execute, and adjust standard operating procedures for day-to-day operations. Ability to document technical analysis and articulate outcomes to non-technical audiences Understanding of current events in the security and threat intelligence world. Strong experience with SIEM, EDR, NDR tools. Good to have, but not mandatory Cyber security certifications Note: "All official offers from Unilever are issued only via our Applicant Tracking System (ATS). Offers from individuals or unofficial sources may be fraudulent please verify before proceeding. "
Posted 4 days ago
2.0 - 6.0 years
3 - 5 Lacs
Hyderabad
Work from Office
Career Category Information Systems Job Description Join Amgen s Mission of Serving Patients At Amgen, if you feel like you re part of something bigger, it s because you are. Our shared mission to serve patients living with serious illnesses drives all that we do. Since 1980, we ve helped pioneer the world of biotech in our fight against the world s toughest diseases. With our focus on four therapeutic areas Oncology, Inflammation, General Medicine, and Rare Disease we reach millions of patients each year. As a member of the Amgen team, you ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. What you will do Let s do this. Let s change the world. In this vital role you will play a crucial role in ensuring the security and integrity of the companys information systems. You will develop and implement security measures, conduct vulnerability assessments, monitor network traffic, and respond to security incidents. Your expertise in security protocols, threat detection, and incident response will contribute to safeguarding the companys data and systems from potential cyber threats. Roles & Responsibilities: Assisting in creating, modifying, and deactivating user accounts while ensuring compliance with security policies. Conducting periodic reviews of user permissions to ensure they align with job functions. Implementing predefined security settings and configurations for systems during the provisioning process. Take responsibility and ownership for completing system owner work youre doing and addressing compliance-related requests. Supporting the monitoring of user access and provisioning activities to identify potential security incidents. Assisting in the analysis of logs for unusual activities related to user provisioning. Develop and update technical documentation, including standard operating procedures (SOPs), design documents, operational diagrams, manuals, and more. Perform regular hardware and software audits on servers and applications to verify they adhere to established standards, policies, and configuration guidelines. Participating in training sessions to understand security standard processes and help educate users on security policies related to provisioning. Collaborating with IT, HR, and other groups to ensure smooth integration of security in provisioning workflows. This role on occasion might have responsibilities outside of business hours. Travel: International and/or domestic travel up to 10% may be essential. This role requires you to work in shifts. What we expect of you We are all different, yet we all use our unique contributions to serve patients. Basic Qualifications: Master s / Bachelor s degree with 2 - 6 years of Information Systems experience or related field. Functional Skills: Must-Have Skills: Ability to analyze and interpret complex data to identify and remediate issues. Familiarity with basic concepts such as confidentiality, integrity, and availability (CIA triad). Sharp learning agility, problem-solving and analytical thinking Ability to produce clear and detailed documentation for processes and security protocols. Good-to-Have Skills: Experience with IS Security. Experience on Sailpoint IIQ / ISC. Proficiency in scripting and automation is a plus. Professional Certifications Microsoft, GCP or AWS Cloud (preferred). Identity Provisioning or Security Certification (preferred). Soft Skills: Excellent analytical and troubleshooting skills. Strong verbal and written communication skills. Ability to work effectively with global, virtual teams. . High degree of initiative and self-motivation. Ability to manage multiple priorities successfully. Team oriented, with a focus on achieving team goals. What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now and make a lasting impact with the Amgen team. careers. amgen. com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. .
Posted 4 days ago
5.0 - 7.0 years
7 - 9 Lacs
Bengaluru
Work from Office
Senior Node.JS Developer Support Hours: CST coverage: 6.30pm - 3.30am IST 5 - 7 years of working experience as a Full Stack Developer. Experience with Python AWS (S3, Lambda, etc.) Designs, develops, tests, deploys and supports API-based systems focusing on industry best practices. Experience working on User Story development & enhancements, Incident & Request Management tasks. Good understanding for Agile scrum process Manages individual tasks and timelines under limited supervision. Seeking continuous quality improvements by performing Application Vulnerability remediation for supported systems. Assists in problem analysis and submits recommendations when appropriate. Proficiency in multiple tools of the full stack covering frontend frameworks, databases and deployments Demonstrated ability to quickly learn new technologies Ability to solve moderately complex problems, drawing upon technical experience, precedents, and judgement Strong communication skills, including ability to explain complex information in straightforward situations Good To Have Skills: JavaScript/TypeScript/Node.js SQL Terraform Angular React
Posted 1 week ago
6.0 - 8.0 years
8 - 10 Lacs
Pune
Work from Office
Senior Software Engineer Overview: Services within Mastercard is responsible for acquiring, engaging, and retaining customers by managing fraud and risk, enhancing cybersecurity, and improving the digital payments experience. We provide value-added services and leverage expertise, data-driven insights, and execution. About Ethoca: At Ethoca, you can join a team of top business and technology innovators who are transforming the industry. We are changing the payments landscape and reinventing the way global merchants and issuers combat fraud and reduce costs. Our services allow customers to focus on what really matters - increasing sales and creating a great customer experience. Our relentless customer focus is what makes us an award-winning company. Role : As a Senior Software Engineer in Test / Senior Automation Engineer, you will: - Play a crucial part in helping drive Quality initiatives across the teams - Adhere to enterprise quality standards, processes and tools - Responsible for developing and executing test plans for a single application, independently generating test data and recognizing test environment preparation needs - Participate in project-level reviews, walkthroughs and inspections, and conducts test reviews, including test plans, requirements, cases and automation - Achieve maximum coverage for test automation - Responsible for automation and Continuous Integration (CI). - Work closely with development team to identify defects early in the cycle through requirements analysis and code reviews. You should apply if: - Bachelor/Master s Degree in Computer Science or equivalent work experience with exposure to quality engineering processes - 6-8 years of overall experience. - Sound knowledge of Java, Spring, JUnit, Eclipse IDE, Rest Assured, Appium, Jbehave/Cucumber frameworks, Databases, APIs (REST/SOAP), Continuous Delivery concepts and tools such as Jenkins/Bamboo, vulnerability tools such as Sonar, Checkmarx/Fortify, etc. - Good knowledge of payments domain message flows, architecture, common design patterns, ISO message protocols, simulation/emulation tools highly desirable. - Experience in multiple types of coding, software development, and/or using automation frameworks; - Hands on experience in writing functional and integrational test cases; - Exposure in building and using automation frameworks using technologies: Serenity, Cucumber, Browserstack, Selenium, others - Experience testing APIs (REST) - Experience in UI testing - Well versed with writing complex database queries to validate data - Ability to create good acceptance and integration test automation scripts and integrate with Continuous integration (Jenkins) - Successfully developed high quality test strategies and text execution, recognized test environment preparation needs - Experience in building automation frameworks, acceptance and integration test automation scripts, integrating with other tools. It would also be great if: - you have knowledge of working on cloud technology such as Azure, AWS - you have knowledge of performance and security testing (e.g. Gatling , JMeter, Blazemeter).
Posted 1 week ago
3.0 - 8.0 years
5 - 10 Lacs
Gurugram
Work from Office
ql-editor "> Job Summary: We are looking for a highly motivated Business Analyst with strong experience in analyzing and documenting requirements for ServiceNow security modules. The ideal candidate will have a solid background in vulnerability management, security incident response, and ServiceNow capabilities. This role involves close collaboration with stakeholders, developers, and solution architects to ensure accurate requirements gathering, gap analysis, and solution design. Key Responsibilities: Collaborate with business and technical teams to gather, analyze, and document detailed business and functional requirements. Write effective and clear user stories in ServiceNow JIRA , following Agile SDLC processes. Create process flows using Visio and define expected outcomes based on stakeholder communication. Work closely with developers and solution architects to translate business needs into technical solutions. Conduct requirement validation sessions with stakeholders to ensure clarity and alignment. Contribute to process improvements and identify opportunities to enhance current implementations. Ensure thorough documentation, strong attention to detail, and timely communication throughout the project lifecycle. Required Skills & Qualifications: Bachelor s degree in Computer Science, Engineering, Business, or a related field. 3 years of hands-on experience in Requirement Analysis . Strong analytical and problem-solving skills . Excellent verbal and written communication skills with a high level of attention to detail. Experience working in Agile environments , with tools like JIRA , Visio , etc. ServiceNow Expertise (Preferred): Hands-on knowledge of ServiceNow modules : Vulnerability Response (VR) Security Incident Response (SIR) Threat Intelligence Good to have exposure to: GRC (Governance, Risk, and Compliance) Security Operations Center (SOC) Service Portal & Workspaces Basic understanding of REST APIs and ServiceNow integrations . Certifications preferred : ServiceNow Admin Certification CIS Vulnerability Response (CIS-VR) CIS Security Incident Response (CIS-SIR) Key Attributes: Ability to recognize implementation gaps, risks, and potential improvements. Strong stakeholder engagement and coordination skills. Capable of balancing multiple priorities in a dynamic, fast-paced environment.
Posted 1 week ago
10.0 - 12.0 years
35 - 40 Lacs
Noida
Work from Office
About this opportunity: Join the exceptional Ericsson team as a crucial part of our Managed Services (MS) deliveries. This position required skills both in IP Networks & Security Operations. Youll be actively involved in enhancing and maintaining the IP network and supporting in Security related audits and compliances. Your role encompasses leading a team that is responsible for managing PAN India IP networks, doing Security portion of Node AT , Security audit related tasks, ensuring contract compliance, participating in threat investigation, reviewing scanned network vulnerabilities and getting them fixed . You will do: - Evaluate security events based on context, relevance, and urgency. - Execute risk management and vulnerability assessments. - Carry out user access management tasks. - Manage PAN India IP network carrying a mix of Mobility and IP services. - Participate in regular risk and security evaluations; review and recommend updates to security requirements. The skills you bring: - IP Networks - Routing, Switching & Firewalls - Exposure to Telecommunication & Mobility networks - Leading a Team in Managed services environment - Security Audits, Security related Acceptance Testing. - Ericsson Information Security Management System. - Network vulnerabilities assessment - Access Management Solutions. - People Management Primary country and city: India (IN) || Noida Req ID: 770544
Posted 1 week ago
6.0 - 8.0 years
8 - 10 Lacs
Bengaluru
Work from Office
Overall Purpose: This career step requires career level experience. Responsible for cyber security areas across products, services, infrastructure, networks, and/or applications while providing protection for AT&T, our customers and our vendors/partners. Works with senior team members on various projects relating to the protection of devices, customers, assets, data, information technology, and networks. Supports innovation, strategic planning, technical proof of concepts, testing, lab work, and various other technical program management related tasks associated with the cyber security programs. Key Roles and Responsibilities: Includes ideation, testing, proof of concept and support for various cyber related projects. Analysis, of complex security issues and the development and engineering activities to help mitigate risk. Analyzes various hardware and/or software solutions recommending purchases and identifying modifications to fit AT&Ts cyber security needs and that of our managed services teams. Develops policies and procedures to minimize network intrusion, malware events and vulnerability issues for internal and external customers. Applies measures to block malicious code and applications. Includes forward looking research, planning and strategy to strengthen our stance against future cyber security threats, and enhance our mitigation techniques and technology solutions. Areas of work in this are include, but are not limited to: Cyber Incident Response, cyber product testing, cyber risk & strategic analysis, cyber research, cyber awareness & training, cyber vulnerability detection & assessment, cyber intelligence & investigation, cyber networks & systems engineering, cyber security application testing, cyber digital forensics & forensics analysis, cyber software assurance, cyber application development & testing, cyber IoT planning & testing, cyber policy & requirements & standards. Job Contribution: Technical professional with some experience. Sound technical knowledge growing through application, expanding knowledge of ATT technologies. Experience: Typically requires 6-8 Years experience. Job Description - External Collaborate with stakeholders to gather and understand business requirements and translate them into technical specifications. Implement and maintain CI/CD pipelines for various software projects, ensuring efficient and reliable software delivery. Collaborate with development and operations teams to define and implement deployment strategies and release management processes. Monitor and troubleshoot CI/CD pipelines, identifying and resolving issues to ensure smooth and uninterrupted software delivery. Stay up-to-date with the latest industry trends and technologies related to CI/CD and Azure DevOps. Provide technical guidance and support to junior developers and team members. Location: IND:KA:Banglaore / Intl Tech Park, Whitefield Rd - Storage: Innovator Building, Itpb, Whitefield Rd Job ID R-75973 Date posted 07/24/2025
Posted 1 week ago
5.0 - 9.0 years
7 - 11 Lacs
Noida
Work from Office
Join our Team About this opportunity: Join the exceptional Ericsson team as a crucial part of our Managed Services (MS) deliveries. This position required skills both in IP Networks & Security Operations. Youll be actively involved in enhancing and maintaining the IP network and supporting in Security related audits and compliances. Your role encompasses leading a team that is responsible for managing PAN India IP networks, doing Security portion of Node AT , Security audit related tasks, ensuring contract compliance, participating in threat investigation, reviewing scanned network vulnerabilities and getting them fixed . You will do: - Evaluate security events based on context, relevance, and urgency. - Execute risk management and vulnerability assessments. - Carry out user access management tasks. - Manage PAN India IP network carrying a mix of Mobility and IP services. - Participate in regular risk and security evaluations; review and recommend updates to security requirements. The skills you bring: - IP Networks - Routing, Switching & Firewalls - Exposure to Telecommunication & Mobility networks - Leading a Team in Managed services environment - Security Audits, Security related Acceptance Testing. - Ericsson Information Security Management System. - Network vulnerabilities assessment - Access Management Solutions. - People Management Why join Ericsson What happens once you apply Primary country and city: India (IN) || Noida Req ID: 770544
Posted 1 week ago
9.0 - 11.0 years
25 - 30 Lacs
Bengaluru
Work from Office
Jul 3, 2025 Location: Bengaluru Designation: Senior Consultant Entity: Deloitte South Asia LLP Your potential, unleashed. India s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Enterprise technology has to do much more than keep the wheels turning; it is the engine that drives functional excellence and the enabler of innovation and long-term growth. Learn more about ET&P Your work profile. As a Senior Consultant in our SAP Team, you ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: - SAP Basis with security Professional should have: Perform BASIS activities including installations, upgrades, and system copies Configure and maintain security settings for S/4 HANA systems Design and implement role-based access control and authorization concepts Manage user administration, role design, and segregation of duties Implement security best practices and compliance requirements Perform security audits and vulnerability assessments Support disaster recovery planning and implementation Configure and maintain SAP Gateway and Fiori security settings Preferred qualifications Graduate degree (Science or Engineering) from premier institutes. Strong communication skills (written & verbal). Willingness to travel for short and long term durations. Location and way of working Base location: PAN India (Remote/Hybrid/Onsite depending on project/client) Your role as a Leader We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society. In addition to living our purpose, Senior Consultant across our organization must strive to be: Inspiring - Leading with integrity to build inclusion and motivation Committed to creating purpose - Creating a sense of vision and purpose Agile - Achieving high-quality results through collaboration and Team unity Skilled at building diverse capability - Developing diverse capabilities for the future Persuasive / Influencing - Persuading and influencing stakeholders Collaborating - Partnering to build new solutions. Delivering value - Showing commercial acumen Committed to expanding business - Leveraging new business opportunities. Analytical Acumen - Leveraging data to recommend impactful approach and solutions through the power of analysis and visualization Effective communication Must be well abled to have well-structured and well-articulated conversations to achieve win-win possibilities Engagement Management / Delivery Excellence - Effectively managing engagement(s) to ensure timely and proactive execution as well as course correction for the success of engagement(s) Managing change - Responding to changing environment with resilience Managing Quality & Risk - Delivering high quality results and mitigating risks with utmost integrity and precision Strategic Thinking & Problem Solving - Applying strategic mindset to solve business issues and complex problems. Tech Savvy - Leveraging ethical technology practices to deliver high impact for clients and for Deloitte Empathetic leadership and inclusivity - creating a safe and thriving environment where everyones valued for who they are, use empathy to understand others to adapt our behaviors and attitudes to become more inclusive. How you ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report . Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterized by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognize there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone s welcome entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you re applying to. Check out recruiting tips from Deloitte professionals.
Posted 1 week ago
6.0 - 7.0 years
4 - 7 Lacs
Hyderabad
Work from Office
Job Description Design, implement, and manage CI/CD pipelines. Proficiency with Build, manage, and automate infrastructure provisioning using Terraform, Ansible, phython, or similar Infrastructure-as-Code (IaC) tools. Continuously integrate security into pipelines and perform vulnerability assessments and remediations. Hands-on experience with Containerize applications and services using Docker and manage orchestration via Kubernetes. Collaborate with development and operations teams to troubleshoot deployment issues, optimize performance, security vulnerabilities and resolve infrastructure bottlenecks. Implement automated rollback strategies and improve deployment reliability. Proven experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or CloudWatch. Maintain and monitor cloud environments (AWS, Azure, or GCP) to ensure availability, scalability, and security. Experience with core networking, cloud security practices, and distributed system architecture. Monitor and evaluate emerging trends in DevOps practices, cloud service advancements, and infrastructure automation frameworks to ensure the adoption of modern, scalable solutions. Ensure detailed and accurate documentation of infrastructure components, system operations, and CI/CD pipelines. Hands-on experience with administering and maintaining Linux-based systems. Qualifications Requirements: Bachelors degree in Computer Science, Information Technology, or related field. 6+ years of experience in AWS / Azure DevOps, AWS / Azure services.
Posted 1 week ago
10.0 - 15.0 years
15 - 19 Lacs
Noida, Indore, Pune
Work from Office
DevOps architect with Docker,Kubernetes expertise Seeking a highly skilled DevOps Architect with deep expertise in Linux, Kubernetes, Docker , and related technologies. The ideal candidate will design, implement, and manage scalable, secure, and automated infrastructure solutions, ensuring the seamless integration of development and operational processes. You will be a key player in the architecture and implementation of CI/CD pipelines, managing infrastructure, container orchestration, and system monitoring. Key Responsibilities: Design and implement DevOps solutions that automate software delivery pipelines and infrastructure provisioning. Architect and maintain scalable Kubernetes clusters to manage containerized applications across multiple environments. Leverage Docker to build, deploy, and manage containerized applications in development, staging, and production environments. Optimize and secure Linux-based environments for application performance, reliability, and security. Collaborate with development teams to implement CI/CD pipelines using tools like Jenkins, GitLab CI, CircleCI, or similar . Monitor, troubleshoot, and improve system performance, security, and availability through effective monitoring and logging solutions (e.g., Prometheus, Grafana, ELK Stack). Automate configuration management and system provisioning tasks on-premise environments. Implement security best practices and compliance measures, including secrets management, network segmentation, and vulnerability scanning. Mentor and guide junior DevOps engineers and promote best practices in DevOps, automation, and cloud-native architecture. Stay up-to-date with industry trends and evolving DevOps tools and technologies to continuously improve systems and processes. Required Skills and Experience: 10+ years of experience in IT infrastructure, DevOps, or systems engineering. Strong experience with Linux systems administration (Red Hat, Ubuntu, CentOS). 3+ years of hands-on experience with Kubernetes in production environments, including managing and scaling clusters. Extensive knowledge of Docker for building, deploying, and managing containers. Proficiency with CI/CD tools such as Jenkins, GitLab CI, Bamboo , or similar. Familiarity with monitoring and logging solutions (Prometheus, Grafana, ELK Stack, etc.). Strong understanding of networking, security best practices , and cloud-based security solutions. Hands-on experience with scripting and automation tools like Bash, Python Excellent troubleshooting, problem-solving, and analytical skills. Experience with Git or other version control systems. Good to have Skills: Experience with service mesh technologies (e.g., Istio, Linkerd) and API gateways . Familiarity with container security tools such as Aqua Security, Twistlock , or similar. Familiarity with Kafka , RabbitMQ, SOLR
Posted 1 week ago
3.0 - 5.0 years
3 - 4 Lacs
Mumbai
Work from Office
Communication Good Email Good Experience Range 3-5 Years Required Skills Set Perform SoD and EoD of NSDL/CDSL/RTGS/SFMS/CCIL/Cash & other banking applications.., Process batch jobs including uploads and downloads required to be performed on various applications as a process or on need basis based on the SOP, SOD/EOD activities based on the SOP provided and as per cut off time on daily basis except when informed by regulator / application teams on account of national holidays & Sundays., Perform Backup support as per SOP, Schedule processes including the processes that need to be executed on a daily, monthly and yearly basis on applications and its databases, Execute the monthly and yearly processes as per schedule , Hand and Feet Support for the devices hosted in PDC, Manage File Transfer jobs- Schedule the given Scripts for file transfer and monitor, Backup Media management Hands and feet support for Backup and Restoration and Media movement.. Salary Range 28000-32000 Qualification Graduation Certification Any Technical Certificate (e.g. Hardware Networking Course, Computer course, MCSE, CCNA) Technical Question Can you describe your experience with data center infrastructure components such as servers, storage systems, networking equipment, and cooling systems What monitoring tools have you used to oversee data center operationsHow do you use these tools to ensure up-time and performance How do you manage and maintain power distribution units (PDUs) and uninterruptible power supplies (UPS) in a data center What are the key considerations when planning and implementing cable management in a data center Can you explain the importance of environmental controls (temperature, humidity) in a data center, and how do you ensure optimal conditions Can you describe your experience with data center infrastructure components such as servers, storage systems, networking equipment, and cooling systems What monitoring tools have you used to oversee data center operationsHow do you use these tools to ensure up-time and performance How do you manage and maintain power distribution units (PDUs) and uninterruptible power supplies (UPS) in a data center What are the key considerations when planning and implementing cable management in a data center Can you explain the importance of environmental controls (temperature, humidity) in a data center, and how do you ensure optimal conditions How do you prioritize and manage tasks in a high-pressure data center environment Can you describe your approach to managing change requests and implementing updates in a live data center What procedures do you follow for routine maintenance and inspections of data center equipment How do you handle capacity planning and scalability in a data center What steps do you take to ensure compliance with operational standards and best practices in a data center Describe a critical incident you managed in a data center. What was the issue, and how did you resolve it How do you prepare for and respond to power outages or cooling system failures in a data center What protocols do you follow in the event of a fire alarm or other emergency situation in a data center Can you explain your approach to disaster recovery planning and testing How do you conduct root cause analysis for data center incidents, and what steps do you take to prevent recurrence How do you communicate operational status and issues to stakeholders and management Describe a time when you collaborated effectively with other teams (IT, facilities, security) to resolve a data center issue. How do you handle conflicts or disagreements within your team or with other departments What strategies do you use to ensure effective communication and coordination during maintenance or upgrades in a data center A critical server in the data center is experiencing performance issues. Walk me through your troubleshooting approach. You receive a notice of an impending power outage due to external factors. What steps do you take to ensure data center up time and safety A new equipment upgrade needs to be deployed urgently in the data center. How do you plan and execute this without disrupting ongoing operations You notice an unusual spike in temperature readings from one section of the data center. How do you investigate and address this issue During a routine inspection, you discover a security vulnerability in the data centers physical access controls. How do you respond and mitigate this issue
Posted 1 week ago
3.0 - 8.0 years
3 - 7 Lacs
Hyderabad
Work from Office
Job Description Lead the design and deployment of scalable security automation workflows and playbooks in Cortex XSOAR (or equivalent platforms such as Splunk SOAR, Siemplify, etc.). Serve as technical owner of the SOAR platform, managing connectors, integrations, performance monitoring, version control, and upgrades. Build custom automations using Python scripts, decision logic, and API integrations to support alert enrichment, containment, and notification tasks. Architect integrations with SIEMs (e.g., Splunk, QRadar), EDR, threat intel feeds (e.g., Anomali, VirusTotal), ticketing systems (e.g., ServiceNow, Jira), and other tools. Drive automation of incident response (IR) use cases including phishing, malware, lateral movement, data exfiltration, insider threats, and vulnerability exploitation. Partner with SOC, threat intelligence, and cloud security teams to identify automation opportunities and translate them into technical solutions. Optimize SOAR playbooks to reduce mean time to detect (MTTD) and respond (MTTR) while maintaining reliability and resilience. Mentor junior automation engineers and provide code reviews, best practices, and process guidance. Contribute to development of automation standards, security engineering roadmaps, and cross-team documentation. Stay abreast of emerging SOAR trends, threat landscapes, and new platform features. Required Qualifications: 3+ years specifically working with SOAR platforms Cortex XSOAR strongly preferred; Splunk SOAR, Siemplify, or Chronicle SOAR also acceptable. Strong scripting experience in Python, especially within automation workflows. Proven expertise in integrating security tools using REST APIs, Python SDKs, and platform connectors. In-depth understanding of SOC operations, incident lifecycle, and security best practices (MITRE ATT&CK, NIST, etc.). Familiarity with SIEM platforms (e.g., Splunk) and threat intelligence enrichment techniques. Experience with version control (Git), CI/CD pipelines, and structured testing of automation code. Demonstrated ability to lead complex automation initiatives and work independently with minimal guidance. Strong written and verbal communication skills, especially in cross-functional team environments.
Posted 1 week ago
1.0 - 6.0 years
10 - 11 Lacs
Mumbai
Work from Office
While technology is the heart of our business, a global and diverse culture is the heart of our success. We love our people and we take pride in catering them to a culture built on transparency, diversity, integrity, learning and growth. If working in an environment that encourages you to innovate and excel, not just in professional but personal life, interests you- you would enjoy your career with Quantiphi! As a Google SecOps SOAR Engineer , you will be responsible for strategic delivery helping our customers securely adopt Google SecOps. You will provide best practices on secure build of Google SecOps platform, foundational cloud implementation for Google SecOps, tackle difficult problems that businesses are facing when building Google SecOps, and more. You will provide prescriptive guidance in ensuring customers receive the best of what Google SecOps can offer and you will ensure that customers have the best experience in migrating, building, modernising, and maintaining Google SecOps. Additionally, you will work closely with Product Management and Product Engineering to drive excellence of Google SecOps and features. Lead the design and implementation of Google SecOps SOAR playbooks for security use cases, such as phishing incident response, vulnerability triage, or threat hunting on Google SecOps based on specific threat models. Integration of Google SecOps SOAR with other security capabilities and tools such as SIEM, EDR, NDR threat intelligence platform, and ticketing systems. Design testing and conduct validation of SOAR playbooks before deployment to live environment. Write custom actions, scripts and/or integrations to extend SOAR platform functionality. Monitor performance and perform timely actions to scale SOAR deployment, especially in a high-volume security environment. Migration of existing assets from existing customer s SIEM/SOAR to SecOps and assisting in implementing the SIEM/SOAR phase-out, phase-in approach. Develop SOAR playbooks to provide case handling and Incident response as per triage needs. Creation of SOAR assets such as reports etc. Guide on building or maturing cloud security programs and the implementation of tools and approaches used for improving cloud security. Minimum Qualifications: Bachelor s degree in Computer Science, Engineering or related technical field or equivalent practical experience. Google SecOps SOAR experience in the areas of responsibility for at least 1 year. Coding experience in one or more general purpose languages. Experience managing customer projects to completion, working with engineering teams, sales and partners. Experience architecting, developing, or maintaining secure Cloud solutions. Strong verbal and written communication skills and the ability to develop high-quality. 8+ years experience in leading projects and delivering technical solutions related to security. Demonstrated experience on consulting or ownership of Security during high-speed environment migration for large-scale businesses with regulatory requirements. Strong verbal and written communication skills (English), and the ability to develop high-quality technical documentation and presentation materials. Ability to be located in Mumbai, India for at least 1 year Good to have: Experience in Prevention, Detection and response to cyber threats. Google SecOps SIEM experience of 1 year in integration of log sources, extension of pre-built UDMs and creation of custom parsers, creation of dashboards , creation of custom rules using YARA-L 2.0 etc. Knowledge and experience in SOAR platforms. Knowledge in GCP, including Google Cloud Professional Certifications (Security, Architect) and other industry certifications (CISSP, CCSP etc). Experience in security governance, security risk management, security operations, security architecture, and/or cyber incident response programs for cloud. Experience working with cloud architecture across a broad set of enterprise use cases and creating end-to-end solution architectures. Excellent organizational, problem-solving, articulating and influencing skills. Experience with industry compliance frameworks (e.g., PCI-DSS, ISO 27017/27018, GDPR, SOC).
Posted 1 week ago
1.0 - 4.0 years
9 - 13 Lacs
Bengaluru
Work from Office
Visa is seeking a Controls Monitoring & Testing Analyst within its Technology Risk Management program to review and assess Cybersecurity and Technology risks. The candidate will perform Risk Assessments, Design Effectiveness Assessments, and Operational Effectiveness Testing for key technology threat vectors such as security configuration management, firewall configuration, application, user access management, and availability & reliability. Responsibilities include managing stakeholder engagement plans, participating in process walkthroughs, tracking/reporting deliverables, and producing high-quality work papers for all lines of defense and risk stakeholders. Additionally, the candidate will interpret data from source systems to perform statistical sampling and aggregate assessment across various risk management levers, collaborate with technology partners, and distill information into management and executive-level reporting. Key Responsibilities: Technology & Cybersecurity Controls Testing: Perform independent technology and cybersecurity controls testing. Document testing results in detailed workpapers. Prepare management reports based on testing outcomes. Communicate findings with stakeholders. Automation for Continuous Monitoring: Develop automation for continuous controls monitoring/auditing for technology and cybersecurity. Monitor the results of automated controls, perform investigation and follow-ups as needed. Risk & Control Self-Assessment (RCSA): Execute RCSA Risk Business Partner (RBP) controls quality review and sample-based testing. Conduct Key Risk Indicator (KRI) testing. Training, Metrics Alignment & Reporting: Develop and track risk management training. Align metrics with reporting dashboards. Develop reporting and stakeholder communication. Basic Qualifications -3 years of relevant work experience and a Bachelors degree Preferred Qualification -Bachelor s degree with 5 years of work experience in cyber, risk controls, or equivalent. -Experience with technology
Posted 1 week ago
6.0 - 7.0 years
8 - 9 Lacs
Bengaluru
Work from Office
Overview About Business Unit: At the heart of everything we do is data and this team. Our premium data assets empower the team to drive desirable outcomes for leading brands across industries. Armed with high volumes of transactional data, digital expertise and unmatched data quality, the team plays a key role in improving all our product offerings. Our data artisans are keen on embracing the latest in technology and trends, so there s always room to grow and something new to learn here. Candidate will be a member of the Data Product Development Team responsible for designing, deploying and managing scalable could infrastructure for the data product engineering group predominantly using AWS, Terraform, Linux and CI/CD tools. Why we are looking for you You have a hands-on experience in AWS. You have a hands-on experience in Linux Administration. You have a hands-on experience in Terraform to develop Infrastructure as code. You have a hands-on experience in configuration management tool like Ansible including writing playbooks. You are well versed in scripting either using Shell Scripting or Python. You have a hands-on experience in implementing CI/CD workflows. You have experience with orchestration tools like Jenkins and GitHub Actions. Good to have knowledge on Docker and Kubernetes. Familiarity with GenAI. You enjoy new challenges and are solution oriented. What you will enjoy in this role: As part of the Epsilon Data Product Engineering team, the pace of the work matches the fast-evolving demands of Fortune 500 clients across the globe. Opportunity to explore various AWS services at depth and enrich your experience on these fast-growing Cloud Services. The role will primarily involve maintaining our environments and managing users to meet our application/project requirements and infrastructure. The open and transparent environment that values innovation and efficiency. Responsibilities Able to set up and manage AWS services like EC2, VPC, S3, and RDS, ensure secure and scalable systems using Auto Scaling and Load Balancing, and control access with IAM roles and security policies. Administer and optimize Red Hat Linux systems in both cloud and on-premises environments, including installation, configuration, patching, and troubleshoot. Develop and maintain automation scripts using Bash, Python, or Perl. Use tools like Terraform, CloudFormation, Ansible, or AWS CDK to automate infrastructure deployment and management. Setting up Jenkins pipeline, or GitHub actions to automate build, test, and deployment processes. Collaborate with developers, architects, and IT teams to support application deployments and troubleshoot issues. Identify and resolve vulnerability on the assets. Qualifications BE / B.Tech / MCA No correspondence course 6-7 years of experience Must have strong experience of working with AWS, Terraform, Linux Administration. Good to have a working experience on Ansible, Jenkins and GitHub Actions. At least 3+ years of experience of working on AWS, Terraform, Linux Administration. Additional Information Epsilon is a global data, technology and services company that powers the marketing and advertising ecosystem. For decades, we ve provided marketers from the world s leading brands the data, technology and services they need to engage consumers with 1 View, 1 Vision and 1 Voice. 1 View of their universe of potential buyers. 1 Vision for engaging each individual. And 1 Voice to harmonize engagement across paid, owned and earned channels. Epsilon s comprehensive portfolio of capabilities across our suite of digital media, messaging and loyalty solutions bridge the divide between marketing and advertising technology. We process 400+ billion consumer actions each day using advanced AI and hold many patents of proprietary technology, including real-time modeling languages and consumer privacy advancements. Thanks to the work of every employee, Epsilon has been consistently recognized as industry-leading by Forrester, Adweek and the MRC. Epsilon is a global company with more than 9,000 employees around the world. Epsilon has a core set of 5 values that define our culture and guide us to bring value for our clients, our people and consumers. We are seeking candidates that align with our values, demonstrate them and make them meaningful in their day-to-day work: Act with integrity. We are transparent and have the courage to do the right thing. Work together to win together. We believe collaboration is the catalyst that unlocks our full potential. Innovate with purpose. We shape the market with big ideas that drive big outcomes. Respect all voices. We embrace differences and foster a culture of connection and belonging. Empower with accountability. We trust each other to own and deliver on common goals. Because You Matter YOUniverse. A work-world with you at the heart of it! At Epsilon, we believe people make the place.
Posted 1 week ago
8.0 - 13.0 years
5 - 12 Lacs
Bengaluru
Hybrid
About the Role: Minimum experience of 8 years in the field of Threats and Vulnerability management in a corporate environment This is a HANDS-ON engineering position for individuals with a passion for Vulnerability Management, managing related tools and supporting business. The role is 70% focused on providing operations support and 30% focused on new projects, enhancements. Hybrid working model is available. Role & Responsibilities: Manage Qualys console using various modules. Make sure client agent coverage is managed at a good level. Support business with Qualys and/or Vulnerability Management requests Understand the current state of the technology components in the IT stack ranging from networking, storage, compute (virtualization, containers), applications & security mgmt. Collaborate with team-mates and understand the threats, vulnerabilities, and risks to the enterprise. Establish non-production and production environments for testing and hosting the applications. Own the end-to-end technical design, unit testing and the maintenance of the hosting environment. Adhere to the Scaled Agile Framework methodologies and tools that exists in the environment. Participate in daily stand-up sessions of Compliance & Security release train and contribute to bi-weekly sprints. Learn System Engineering concepts to analyse existing environment and find more efficient ways. Identify ways of doing things with full automation, AI and ML which needs knowing/learning the concepts of these technologies. If interested please do share your updated profile to archana.r@bahwancybertek.com
Posted 1 week ago
3.0 - 6.0 years
4 - 7 Lacs
Gurugram
Work from Office
RESPONSIBILITIES Perform penetration testing and vulnerability assessments on web, API, and mobile applications to identify security weaknesses Create new testing methods to identify vulnerabilities. Pinpoint methods and entry points that attackers may use to exploit vulnerabilities or weaknesses. Search for weaknesses in common software, web applications, and proprietary systems. Document and communicate findings as per ASVS checklist, risks, and recommendations in detailed reports for technical and non-technical stakeholders Review and provide feedback for information security fixes. Establish improvements for existing security services, including hardware, software, policies, and procedures. Identify areas where improvement is needed in security education and awareness for users. Be sensitive to corporate considerations when performing testing (i.e. minimize downtime and loss of employee productivity). Stay updated on emerging threats, security trends, and best practices in cybersecurity to improve testing methodologies REQUIRED 3-6 years of Security Vulnerable, Exploitation, and Penetration testing experience. Experience with OWASP testing Guide / Open-Source Security Testing Methodology Manual Experience deploying enterprise security testing solutions. Familiarity with Secure Development Lifecycle practices and Agile development with Continuous Delivery / Integration. Advanced understanding of security concepts and security best practices Understanding and familiarity with common code review methods and standards Experience with performing penetration testing and risk assessments against computer networks Background with Qualys, Tenable, and OpenVAS Vulnerability Scanners Ability to think analytically. Knowledge of technical systems and terminology. Proficiency in scripting languages. Ability to identify and exploit vulnerabilities. GOOD TO HAVE Relevant industry certifications like CEH, GPEN, OSCP, OSCE, CRTO, CRTP, PNPT, and experience working with frameworks like MITRE ATT&CK/D3FEND) and security-related legal and regulatory requirements (ISO 27001, NIST, PCIDSS etc.). Strong problem-solving skills and leadership abilities, with good interpersonal skills to build relationships and communicate findings professionally, with fluency in written and spoken English.
Posted 1 week ago
7.0 - 12.0 years
12 - 16 Lacs
Bengaluru
Work from Office
Role: Security Engineering Lead Standard Title: Manager I, Security Engineering Location: Bangalore, India About Us Founded in 2014, Circles is a global technology company reimagining the telco industry with its innovative SaaS platform, empowering telco operators worldwide to effortlessly launch innovative digital brands or refresh existing ones, accelerating their transformation into techcos. Today, Circles partners with leading telco operators across multiple countries and continents, including KDDI Corporation, Etisalat Group (e&), AT&T, and Telkomsel, creating blueprints for future telco and digital experiences enjoyed by millions of consumers globally. Besides its SaaS business, Circles operates three other distinct businesses: Circles.Life : A wholly-owned digital lifestyle telco brand based in Singapore, Circles.Life is powered by Circles SaaS platform and pioneering go-to-market strategies. It is the digital market leader in Singapore and has won numerous awards for marketing, customer service, and innovative product offerings beyond connectivity. Circles Aspire : A global provider of Communications Platform-as-a-Service (CPaaS) solutions. Its cloud-based Experience Cloud platform enables enterprises, service providers and developers to deliver and scale mobile, messaging, IoT, and connectivity services worldwide. Jetpac : Specializing in travel tech solutions, Jetpac provides seamless eSIM roaming for over 200 destinations and innovative travel lifestyle products, redefining connectivity for digital travelers. Jetpac was awarded Travel eSIM of the Year. Circles is backed by renowned global investors, including Peak XV Partners (formerly Sequoia), Warburg Pincus, Founders Fund, and EDBI (the investment arm of the Singapore Economic Development Board), with a track record of backing industry challengers. About This Role As a Manager I of security operations and vulnerability management , you will be given a unique opportunity to drive security maturity across Circles live markets environments. You will be responsible for working on: Drive standardization of security best practices to improve the security program maturity across Circles live markets. Prepare and deliver regular reports on overall security program maturity, incident status, and vulnerability management activities to senior management. Ensure adherence to internal security policies, industry standards, and regulatory requirements. Lead the vulnerability management team to ensure adherence to continuous vulnerability assessment processes. Drive strategies to automate and improve efficiencies of the team. Conduct regular risk assessments and vulnerability assessments. Identify potential threats and weaknesses, and work with the operations teams to develop strategies to mitigate risks to the organization. Track the latest threats and vulnerabilities (CVE) in the industry. Quickly analyze if it affects the Circles infrastructure and work with the operations teams to remediate the vulnerability. Maintain detailed and accurate documentation of security incidents and vulnerability management processes. Ensure documentation is updated and accessible for review and audits. Manage the vulnerability assessment process, including scanning, identification, and prioritization of security vulnerabilities. Collaborate closely with Engineering, SRE, IT and other relevant departments to remediate vulnerabilities and track resolution progress. What are we looking for Minimum of 7+ years of experience in security operations, vulnerability management, or a related field, with at least 2 years in a supervisory role. Solid understanding of security operations and vulnerability management principles. Proficiency in security technologies, tools, and methodologies (e.g., SIEM, vulnerability scanners, CSPM, CVE analysis, Kubernetes security) Strong stakeholder management skills Excellent communication and interpersonal skills. Ability to work effectively under pressure and manage multiple priorities. Detail-oriented with strong organizational skills. Proven leadership and team management capabilities. High level of integrity and commitment to security best practices. Security certifications CISSP, CISM, CCSP etc will be good but not a requirement To all recruitment agencies: Circles will only acknowledge resumes shared by recruitment agencies if selected in our preferred supplier partnership program. Please do not forward resumes to our jobs alias, Circles employees or any other company location. Circles will not be held accountable for any fees related to unsolicited resumes not uploaded via our ATS. Circles is committed to a diverse and inclusive workplace. We are an equal opportunity employer and do not discriminate on the basis of race, national origin, gender, disability or age.
Posted 1 week ago
5.0 - 10.0 years
3 - 7 Lacs
Mumbai
Work from Office
Fynd is India s largest omnichannel platform and a multi-platform tech company specialising in retail technology and products in AI, ML, big data, image editing, and the learning space. It provides a unified platform for businesses to seamlessly manage online and offline sales, store operations, inventory, and customer engagement. Serving over 2,300 brands, Fynd is at the forefront of retail technology, transforming customer experiences and business processes across various industries. At Fynd, we re looking for an Offensive Security Engineer to lead red teaming and penetration testing efforts across our digital ecosystem. You ll simulate real-world attacks, identify complex vulnerabilities, and partner with teams to strengthen our security posture from product design to production. This role is ideal for engineers passionate about adversary emulation, building tools, and driving secure innovation at scale. What will you do at Fynd Conduct deep-dive penetration testing and red team simulations on web, mobile, cloud, APIs, and thick client systems. Perform proactive threat modeling during product development to identify design-stage risks. Build custom scripts/tools and automate offensive security workflows. Report technical findings with clear, actionable remediation strategies. Collaborate with engineering and product teams to embed offensive security into the SDLC. Stay updated on latest threat techniques, CVEs, exploits, and red team tooling. Some more requirements 5+ years in offensive security, penetration testing, or red teaming. Experience with OWASP Top 10, ASVS, MITRE ATT&CK, and threat modeling frameworks. Hands-on with cloud platforms (AWS/GCP/Azure), thick clients, and secure app architecture. Proficiency in scripting (Python, Go, Bash) and tools like Burp Suite, ZAP, Metasploit, Cobalt Strike. Strong communication and reporting skills for both technical and business audiences. Additional Skills Experience in ecommerce or AI/ML-driven platforms. Prior work in vulnerability research, CVE publication, or exploit development. Certifications: OSCP, OSWE, OSEP, CRTO or cloud security certs. Contributions to open-source tools, blogs, or conferences in the infosec community. What do we offer Growth Growth knows no bounds, as we foster an environment that encourages creativity, embraces challenges, and cultivates a culture of continuous expansion. We are looking at new product lines, international markets and brilliant people to grow even further. We teach, groom and nurture our people to become leaders. You get to grow with a company that is growing exponentially. Flex University : We help you upskill by organising in-house courses on important subjects Learning Wallet: You can also do an external course to upskill and grow, we reimburse it for you. Culture Community and Team building activities Host weekly, quarterly and annual events/parties. Wellness Mediclaim policy for you + parents + spouse + kids Experienced therapist for better mental health, improve productivity & work-life balance We work from the office 5 days a week to promote collaboration and teamwork. Join us to make an impact in an engaging, in-person environment!
Posted 1 week ago
7.0 - 12.0 years
12 - 16 Lacs
Bengaluru
Work from Office
Role: Security Engineering Lead Standard Title: Manager I, Security Engineering Location: Bangalore, India About Us Founded in 2014, Circles is a global technology company reimagining the telco industry with its innovative SaaS platform, empowering telco operators worldwide to effortlessly launch innovative digital brands or refresh existing ones, accelerating their transformation into techcos. Today, Circles partners with leading telco operators across multiple countries and continents, including KDDI Corporation, Etisalat Group (e&), AT&T, and Telkomsel, creating blueprints for future telco and digital experiences enjoyed by millions of consumers globally. Besides its SaaS business, Circles operates three other distinct businesses: Circles.Life : A wholly-owned digital lifestyle telco brand based in Singapore, Circles.Life is powered by Circles SaaS platform and pioneering go-to-market strategies. It is the digital market leader in Singapore and has won numerous awards for marketing, customer service, and innovative product offerings beyond connectivity. Circles Aspire : A global provider of Communications Platform-as-a-Service (CPaaS) solutions. Its cloud-based Experience Cloud platform enables enterprises, service providers and developers to deliver and scale mobile, messaging, IoT, and connectivity services worldwide. Jetpac : Specializing in travel tech solutions, Jetpac provides seamless eSIM roaming for over 200 destinations and innovative travel lifestyle products, redefining connectivity for digital travelers. Jetpac was awarded Travel eSIM of the Year. Circles is backed by renowned global investors, including Peak XV Partners (formerly Sequoia), Warburg Pincus, Founders Fund, and EDBI (the investment arm of the Singapore Economic Development Board), with a track record of backing industry challengers. About This Role As a Manager I of security operations and vulnerability management , you will be given a unique opportunity to drive security maturity across Circles live markets environments. You will be responsible for working on: Drive standardization of security best practices to improve the security program maturity across Circles live markets. Prepare and deliver regular reports on overall security program maturity, incident status, and vulnerability management activities to senior management. Ensure adherence to internal security policies, industry standards, and regulatory requirements. Lead the vulnerability management team to ensure adherence to continuous vulnerability assessment processes. Drive strategies to automate and improve efficiencies of the team. Conduct regular risk assessments and vulnerability assessments. Identify potential threats and weaknesses, and work with the operations teams to develop strategies to mitigate risks to the organization. Track the latest threats and vulnerabilities (CVE) in the industry. Quickly analyze if it affects the Circles infrastructure and work with the operations teams to remediate the vulnerability. Maintain detailed and accurate documentation of security incidents and vulnerability management processes. Ensure documentation is updated and accessible for review and audits. Manage the vulnerability assessment process, including scanning, identification, and prioritization of security vulnerabilities. Collaborate closely with Engineering, SRE, IT and other relevant departments to remediate vulnerabilities and track resolution progress. What are we looking for Minimum of 7+ years of experience in security operations, vulnerability management, or a related field, with at least 2 years in a supervisory role. Solid understanding of security operations and vulnerability management principles. Proficiency in security technologies, tools, and methodologies (e.g., SIEM, vulnerability scanners, CSPM, CVE analysis, Kubernetes security) Strong stakeholder management skills Excellent communication and interpersonal skills. Ability to work effectively under pressure and manage multiple priorities. Detail-oriented with strong organizational skills. Proven leadership and team management capabilities. High level of integrity and commitment to security best practices. Security certifications CISSP, CISM, CCSP etc will be good but not a requirement To all recruitment agencies: Circles will only acknowledge resumes shared by recruitment agencies if selected in our preferred supplier partnership program. Please do not forward resumes to our jobs alias, Circles employees or any other company location. Circles will not be held accountable for any fees related to unsolicited resumes not uploaded via our ATS. Circles is committed to a diverse and inclusive workplace. We are an equal opportunity employer and do not discriminate on the basis of race, national origin, gender, disability or age.
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The vulnerability job market in India is growing rapidly as organizations prioritize cybersecurity to protect their data and systems. Vulnerability professionals play a crucial role in identifying and addressing weaknesses in IT infrastructure to prevent cyber attacks and data breaches.
The average salary range for vulnerability professionals in India varies based on experience and location. Entry-level positions may start at around INR 3-5 lakhs per annum, while experienced professionals can earn upwards of INR 10-15 lakhs per annum.
In the field of vulnerability, a typical career path may include roles such as: - Junior Security Analyst - Security Engineer - Vulnerability Manager - Chief Information Security Officer
In addition to expertise in vulnerability assessment and management, professionals in this field may also benefit from skills in: - Penetration testing - Network security - Incident response - Risk management
As you prepare for interviews in the vulnerability field, remember to showcase your technical skills, problem-solving abilities, and knowledge of cybersecurity best practices. Stay updated on industry trends and be confident in your expertise as you pursue opportunities in this dynamic and rewarding field. Good luck!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough