Jobs
Interviews

384 Vulnerability Jobs - Page 5

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 8.0 years

5 - 10 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Job : We are looking for a skilled Network Firewalls and Load Balancer Engineer with 3 + years experience. The ideal candidate will have extensive experience in managing and securing network infrastructure, with a focus on firewalls and load balancing technologies. Responsibilities: Design, implement, and manage firewall and load balancing solutions to ensure network security and optimal performance. Monitor network traffic and performance, identifying and mitigating potential threats and bottlenecks. Configure and maintain firewalls, including rule sets, VPNs, and security policies. Implement and manage load balancing solutions to distribute network traffic efficiently. Conduct regular security audits and vulnerability assessments, implementing corrective actions as needed. Collaborate with network engineers and other IT staff to develop and maintain network security protocols. Provide technical support and troubleshooting for firewall and load balancing issues. Stay updated with the latest security trends, technologies, and best practices. Document network configurations, changes, and incident response activities. Requirements: Bachelors degree in Computer Science, Information Technology, or a related field. Relevant certifications (e.g., CCNA, CCNP, CISSP, F5 Certified BIG-IP Administrator). Proven experience in network security, firewall management, and load balancing. Strong knowledge of network protocols, firewall technologies, VPNs, IDS/IPS, and load balancing solutions (e.g., F5, Citrix ADC). Excellent problem-solving and analytical skills. Ability to work independently and as part of a team.

Posted 3 weeks ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Hyderabad

Work from Office

At Alight, we believe a company s success starts with its people. At our core, we Champion People, help our colleagues Grow with Purpose and true to our name we encourage colleagues to Be Alight. Our Values: Champion People - be empathetic and help create a place where everyone belongs. Grow with purpose - Be inspired by our higher calling of improving lives. Be Alight - act with integrity, be real and empower others. It s why we re so driven to connect passion with purpose. Alight helps clients gain a benefits advantage while building a healthy and financially secure workforce by unifying the benefits ecosystem across health, wealth, wellbeing, absence management and navigation. With a comprehensive total rewards package, continuing education and training, and tremendous potential with a growing global organization, Alight is the perfect place to put your passion to work. Join our team if you Champion People, want to Grow with Purpose through acting with integrity and if you embody the meaning of Be Alight. Learn more at careers.alight.com . As a Senior Cloud Security Analyst , you will play a critical role in ensuring the security and compliance of our cloud infrastructure. You ll collaborate with cross-functional teams to design, implement, and maintain robust security measures across our cloud platforms. Your expertise will be instrumental in safeguarding our systems, data, and applications. You will assist in the wider operational activities including but not limited to validating and addressing identified security risks, Data Security, SOC1/SOC2 Audits, Client Audits, security certifications, vulnerability testing and support management teams during security incident events. You should be confident and capable of explaining the risk and remediation positions for threats as part of the global security incident management process related to cloud security. Duties & Responsibilities Cloud Security Posture Management (CSPM): Drive remediation of open security risks. Collaborate with the Information Security and compliance team to develop global cloud security architecture and maturity standards. Evaluate and respond to alerts and events from security tools, fine-tuning configurations to minimize false positives. Develop event response documentation and processes for the Security Operations Center. Work closely with Cloud Operations teams to define and implement security standards and best practices. Maintain documentation and diagrams for security tools, system environments, and cloud operations. Host Configuration Management: Conduct regular scans of host configurations to identify configuration violations and ensure compliance with security policies and CIS Benchmarks. Develop and implement remediation plans for identified violations. Collaborate with IT and DevOps teams to ensure secure configurations are maintained. Cloud Workload Protection: Perform vulnerability assessment on container images and containerized environments using industry standard tools. Identify, assess, assign, and report vulnerabilities throughout the container lifecycle. Work with development teams to ensure vulnerabilities are addressed in a timely manner. Implement security controls and best practices for container orchestration platforms. Combine security assessment tools with automation to proactively identify and remediate vulnerabilities. Collaborate with functional-area architects and security specialists to ensure adequate controls are in place. Incident Response Monitoring: Monitor and analyze security logs and events. Respond promptly to security incidents, investigating and containing threats. Work within a DevOps security model to automate incident response. Serve as a subject matter expert (SME) for security tools and processes. Position Requirements: Bachelor s or Master s degree in Computer Science, Engineering, Information Security, or similar boot camp certifications. Relevant certifications (e.g., AWS, CISSP, CCSP, CISM, GSEC) are highly desirable. Proven experience in cloud security, vulnerability management, and/or incident response. Strong knowledge of cloud platforms (e.g., AWS, Azure, Google Cloud-optional). Familiarity with security assessment tools (e.g. Host Configuration Management, Cloud Security Posture Management (CSPM), cloud native tools, Vulnerability scanners, etc). Experience with developing and managing software application(s), APIs, or cloud infrastructure Familiarity with one to many programing languages and infrastructure as Code (IAC) Ability to collaborate effectively with cross-functional global teams. Alight requires all virtual interviews to be conducted on video. Flexible Working So that you can be your best at work and home, we consider flexible working arrangements wherever possible. Alight has been a leader in the flexible workspace and Top 100 Company for Remote Jobs 5 years in a row. Benefits We offer programs and plans for a healthy mind, body, wallet and life because it s important our benefits care for the whole person. Options include a variety of health coverage options, wellbeing and support programs, retirement, vacation and sick leave, maternity, paternity & adoption leave, continuing education and training as well as several voluntary benefit options. By applying for a position with Alight, you understand that, should you be made an offer, it will be contingent on your undergoing and successfully completing a background check consistent with Alight s employment policies. Background checks may include some or all the following based on the nature of the position: SSN/SIN validation, education verification, employment verification, and criminal check, search against global sanctions and government watch lists, credit check, and/or drug test. You will be notified during the hiring process which checks are required by the position. Our commitment to Inclusion We celebrate differences and believe in fostering an environment where everyone feels valued, respected, and supported. We know that diverse teams are stronger, more innovative, and more successful. At Alight, we welcome and embrace all individuals, regardless of their background, and are dedicated to creating a culture that enables every employee to thrive. Join us in building a brighter, more inclusive future. As part of this commitment, Alight will ensure that persons with disabilities are provided reasonable accommodations for the hiring process. If reasonable accommodation is needed, please contact alightcareers@alight.com . Equal Opportunity Policy Statement Alight is an Equal Employment Opportunity employer and does not discriminate against anyone based on sex, race, color, religion, creed, national origin, ancestry, age, physical or mental disability, medical condition, pregnancy, marital or domestic partner status, citizenship, military or veteran status, sexual orientation, gender, gender identity or expression, genetic information, or any other legally protected characteristics or conduct covered by federal, state, or local law. In addition, we take affirmative action to employ, disabled persons, disabled veterans and other covered veterans. Alight provides reasonable accommodations to the known limitations of otherwise qualified employees and applicants for employment with disabilities and sincerely held religious beliefs, practices and observances, unless doing so would result in undue hardship. Applicants for employment may request a reasonable accommodation/modification by contacting their recruiter. Authorization to work in the Employing Country Applicants for employment in the country in which they are applying (Employing Country) must have work authorization that does not now or in the future require sponsorship of a visa for employment authorization in the Employing Country and with Alight. Note, this job description does not restrict managements right to assign or reassign duties and responsibilities of this job to other entities; including but not limited to subsidiaries, partners, or purchasers of Alight business units. We offer you a competitive total rewards package, continuing education & training, and tremendous potential with a growing worldwide organization. DISCLAIMER: Nothing in this job description restricts managements right to assign or reassign duties and responsibilities of this job to other entities; including but not limited to subsidiaries, partners, or purchasers of Alight business units. .

Posted 3 weeks ago

Apply

7.0 - 12.0 years

9 - 14 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Job : We are looking for a skilled Network Firewalls and Load Balancer Engineer with 7 + years experience. The ideal candidate will have extensive experience in managing and securing network infrastructure, with a focus on firewalls and load balancing technologies. Responsibilities: Design, implement, and manage firewall and load balancing solutions to ensure network security and optimal performance. Monitor network traffic and performance, identifying and mitigating potential threats and bottlenecks. Configure and maintain firewalls, including rule sets, VPNs, and security policies. Implement and manage load balancing solutions to distribute network traffic efficiently. Conduct regular security audits and vulnerability assessments, implementing corrective actions as needed. Collaborate with network engineers and other IT staff to develop and maintain network security protocols. Provide technical support and troubleshooting for firewall and load balancing issues. Stay updated with the latest security trends, technologies, and best practices. Document network configurations, changes, and incident response activities. Requirements: Bachelors degree in Computer Science, Information Technology, or a related field. Relevant certifications (e.g., CCNA, CCNP, CISSP, F5 Certified BIG-IP Administrator). Proven experience in network security, firewall management, and load balancing. Strong knowledge of network protocols, firewall technologies, VPNs, IDS/IPS, and load balancing solutions (e.g., F5, Citrix ADC). Excellent problem-solving and analytical skills. Ability to work independently and as part of a team.

Posted 3 weeks ago

Apply

3.0 - 8.0 years

5 - 10 Lacs

Hyderabad

Work from Office

Your seniority as a security engineer puts you in the ranks of the top talent in your field. Play a critical role at one of the worlds most iconic financial institutions where security is vital. As a Security Engineer III at JPMorgan Chase within the Cyber Security and Technology Controls, you will be an experienced member of a team dedicated to developing software solutions that meet established functional and user requirements while ensuring protection against misuse, circumvention, and malicious activities. You will implement essential technology solutions using tamper-proof, audit-defensible methods across diverse technical domains within various business functions, all in support of the firms business objectives. Job responsibilities Executes security solutions design, development, and technical troubleshooting with the ability to apply knowledge of existing security solutions to satisfy security requirements for internal clients (e.g., product, platform, application owners) Creates secure and high-quality production code and maintains algorithms that run synchronously with appropriate systems Applies specialized tools (e.g., vulnerability scanner) to analyze and correlate incident data to identify, interpret, and summarize the probability and impact of threats when determining specific vulnerabilities Leads delivery of continuity-related awareness, training, educational activities, and exercises Adds to team culture of diversity, opportunity, inclusion, and respect Required qualifications, capabilities, and skills Formal training or certification on security engineering concepts and 3+ years applied experience. Hands on experience in React, Java\J2EE, Microservices, Spring, Database knowledge, Spring Data JPA, CI\CD, Designing features, Production issue debugging and fixing Experience developing security engineering solutions Proficient in coding in one of more languages Overall knowledge of the Software Development Life Cycle Solid understanding of agile methodologies such as CI/CD, application resiliency, and security Preferred qualifications, capabilities, and skills Familiarity with modern front-end technologies Familiar with Camunda 8, Database modelling, Performance tuning & Cloud Your seniority as a security engineer puts you in the ranks of the top talent in your field. Play a critical role at one of the worlds most iconic financial institutions where security is vital. As a Security Engineer III at JPMorgan Chase within the Cyber Security and Technology Controls, you will be an experienced member of a team dedicated to developing software solutions that meet established functional and user requirements while ensuring protection against misuse, circumvention, and malicious activities. You will implement essential technology solutions using tamper-proof, audit-defensible methods across diverse technical domains within various business functions, all in support of the firms business objectives. Job responsibilities Executes security solutions design, development, and technical troubleshooting with the ability to apply knowledge of existing security solutions to satisfy security requirements for internal clients (e.g., product, platform, application owners) Creates secure and high-quality production code and maintains algorithms that run synchronously with appropriate systems Applies specialized tools (e.g., vulnerability scanner) to analyze and correlate incident data to identify, interpret, and summarize the probability and impact of threats when determining specific vulnerabilities Leads delivery of continuity-related awareness, training, educational activities, and exercises Adds to team culture of diversity, opportunity, inclusion, and respect Required qualifications, capabilities, and skills Formal training or certification on security engineering concepts and 3+ years applied experience. Hands on experience in React, Java\J2EE, Microservices, Spring, Database knowledge, Spring Data JPA, CI\CD, Designing features, Production issue debugging and fixing Experience developing security engineering solutions Proficient in coding in one of more languages Overall knowledge of the Software Development Life Cycle Solid understanding of agile methodologies such as CI/CD, application resiliency, and security Preferred qualifications, capabilities, and skills Familiarity with modern front-end technologies Familiar with Camunda 8, Database modelling, Performance tuning & Cloud

Posted 3 weeks ago

Apply

2.0 - 6.0 years

3 - 6 Lacs

Hyderabad

Work from Office

Detailed job description - Skill Set: Technically strong hands-on Self-driven Good client communication skills Able to work independently and good team player Flexible to work in PST hour(overlap for some hours) Past development experience for Cisco client is preferred.

Posted 3 weeks ago

Apply

3.0 - 7.0 years

13 - 17 Lacs

Ahmedabad

Work from Office

About Us . Role Summary Teams mandate is to find new and notable threats, assess their risk and produce protection where necessary. This include advanced targeted attacks, "attack tool" research, handling of vulnerability advisories and publishing blogs and whitepapers. The successful candidate will provide analysis of the evolving cyber threat landscape and contribute to create the next generation of SophosLabs research tools. The ideal candidate is passionate about computer security and has high aptitude for solving challenging puzzles with an attention to detail. What you will do Perform cyber threat analysis utilizing multiple information sources Engage research based on cyber threat intelligence Investigate APT campaigns and understand cyber threat actors, their motivations and technical capabilities Identify steps to be taken to respond and minimize the impact of emerging threats Reverse engineer files to discover their intended functionality and risks to customers Write threat descriptions for publication on the Sophos website and threat research whitepapers in a timely fashion Triage requests submitted by other departments, respond to tasks or escalate complex issues to senior team members Generating intelligence on new trends in the Threat Landscape and distributing between departments outside of the Lab Identify opportunities to write blogs for the Sophos website to raise customer awareness What you will bring 5+ yrs in Threat Researcher role Experience with x86 assembly Windows Internals Computer and Web Security experience Programming skills and experience (C/C++/Python/Perl) Reverse Engineering experience using IDA Pro, WinDbg, OllyDbg and Hex editors Good written and verbal communication skills Understanding of scripting basics (Perl/Python/Regexp) Experience with a wide array of Internet technologies and protocols (HTML, JavaScript, SMTP, DNS) Experience with a broad range of operating systems Bachelor s degree in computer software (or equivalent) #LI-Remote #B2 Ready to Join Us? At Sophos, we believe in the power of diverse perspectives to fuel innovation. Research shows that candidates sometimes hesitate to apply if they dont check every box in a job description. We challenge that notion. Your unique experiences and skills might be exactly what we need to enhance our team. Dont let a checklist hold you back we encourage you to apply. Whats Great About Sophos? Sophos operates a remote-first working model, making remote work the primary option for most employees. However, some roles may necessitate a hybrid approach. Please refer to the location details in our job postings for further information. Our people we innovate and create, all of which are accompanied by a great sense of fun and team spirit Employee-led diversity and inclusion networks that build community and provide education and advocacy Annual charity and fundraising initiatives and volunteer days for employees to support local communities Global employee sustainability initiatives to reduce our environmental footprint Global fitness and trivia competitions to keep our bodies and minds sharp Global wellbeing days for employees to relax and recharge Monthly wellbeing webinars and training to support employee health and wellbeing Our Commitment To You We re proud of the diverse and inclusive environment we have at Sophos, and we re committed to ensuring equality of opportunity. We believe that diversity, combined with excellence, builds a better Sophos, so we encourage applicants who can contribute to the diversity of our team. All applicants will be treated in a fair and equal manner and in accordance with the law regardless of gender, sex, gender reassignment, marital status, race, religion or belief, color, age, military veteran status, disability, pregnancy, maternity or sexual orientation. We want to give you every opportunity to show us your best self, so if there are any adjustments we could make to the recruitment and selection process to support you, please let us know. Data Protection If you choose to explore an opportunity, and subsequently share your CV or other personal details with Sophos, these details will be held by Sophos for 12 months in accordance with our Privacy Policy and used by our recruitment team to contact you regarding this or other relevant opportunities at Sophos. If you would like Sophos to delete or update your details at any time, please follow the steps set out in the Privacy Policy describing your individual rights. For more information on Sophos data protection practices, please consult our Privacy Policy Cybersecurity as a Service Delivered | Sophos

Posted 3 weeks ago

Apply

2.0 - 8.0 years

3 - 7 Lacs

Hyderabad

Work from Office

Detailed job description - Skill Set: Technically strong hands-on Self-driven Good client communication skills Able to work independently and good team player Flexible to work in PST hour(overlap for some hours) Past development experience for Cisco client is preferred.

Posted 3 weeks ago

Apply

3.0 - 5.0 years

4 - 8 Lacs

Hyderabad

Work from Office

Detailed job description - Skill Set: Technically strong hands-on Self-driven Good client communication skills Able to work independently and good team player Flexible to work in PST hour(overlap for some hours) Past development experience for Cisco client is preferred.

Posted 3 weeks ago

Apply

8.0 - 10.0 years

20 - 25 Lacs

Bengaluru

Work from Office

Tech Lead - Full Stack Developer 8-10 years of working experience as a Full Stack Developer. Experience with Object Oriented Programming & Design, Object-relation Mapping (ORM), NodeJS, React JS, AWS, Next.JS, JavaScript, C# .NET Framework 4.8, , PL/ SQL. Designs, develops, tests, deploys and supports API-based systems focusing on industry best practices. Experience working on User Story development & enhancements, Incident & Request Management tasks. Good understanding for Agile scrum process Manages individual tasks and timelines under limited supervision. Seeking continuous quality improvements by performing Application Vulnerability remediation for supported systems. Assists in problem analysis and submits recommendations when appropriate. Proficiency in multiple tools of the full stack covering frontend frameworks, databases and deployments Demonstrated ability to quickly learn new technologies Ability to solve moderately complex problems, drawing upon technical experience, precedents, and judgement Strong communication skills, including ability to explain complex information in straightforward situations Hongkong Rotational Hours: Shift1 : Normal Business Hours: 7:00 AM to 4:00 PM IST Shift2: Normal Business Hours: 3:00 PM to 12:00 AM IST

Posted 3 weeks ago

Apply

2.0 - 6.0 years

5 - 8 Lacs

Bengaluru

Work from Office

Acceldata is reimagining the way companies observe their Data! Acceldata is the pioneer and leader in data observability, revolutionizing how enterprises manage and observe data by offering comprehensive insights into various key aspects of data, data pipelines and data infrastructure across various environments. Our platform empowers data teams to manage products effectively by ensuring data quality, preventing failures, and controlling costs. What we are looking for? We are looking for a highly skilled and motivated Security Engineer to join our Infra and Security team. The candidate will be responsible for vulnerability management across our SaaS and on-premise product stacks, driving both remediation and validation efforts. This role also involves conducting penetration testing and leveraging security tools for SAST and DAST to proactively secure our applications and infrastructure. Key Responsibilities: Vulnerability Management- Identify, prioritise, and manage security vulnerabilities across both SaaS and on-premise environments. Collaborate with product and engineering teams to ensure timely remediation. Track and report on remediation progress and verify effectiveness of fixes. Fixing & Validation - Work with developers to fix vulnerabilities at the code and configuration levels. Validate fixes through retesting, code reviews, and regression testing. Penetration Testing - Conduct internal penetration testing using tools like OWASP ZAP, Burp Suite, and other industry-standard toolkits. Simulate real-world attacks to assess the security posture of applications and infrastructure. Document findings and deliver detailed reports with actionable recommendations. SAST and DAST Integration- Integrate and maintain Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) tools within CI/CD pipelines. Analyze results and guide development teams on security best practices. Desired Experience: Proven experience in vulnerability management in both SaaS and on-prem environments. Hands-on experience with security testing tools such as OWASP ZAP, Burp Suite, or similar. Familiarity with common vulnerability scanning tools and techniques. Strong understanding of SAST and DAST concepts, tools, and workflows. Knowledge of common security standards and frameworks (e.g., OWASP Top 10, CVSS, NVD). Ability to read, understand, and remediate application code or configurations. Excellent problem-solving and communication skills. We care for our team Mentorship & Growth ESOPs Medical and Life Insurance Paid Maternity & Parental Leave Corporate Uber Program Learning & Development Support Acceldata for All We are a fast-growing company, solving complex data problems at scale. We are driven by strong work ethics, high standards of excellence, and a spirit of collaboration. We promote innovation, commitment, and accountability. Our goal is to cultivate a healthy work environment that fosters a sense of belonging, encourages teamwork, and brings out the best in every individual. Why Acceldata? Acceldata is redefining data observability for enterprise data systems. Founded by experts who recognized the need for innovative monitoring and management solutions in a cloud-first, AI-driven environment, our platform empowers data teams to effectively manage data products. We address common challenges such as scaling and performance issues, cost overruns, and data quality problems by providing operational visibility, proactive alerts, and monitoring reliability across the various environments.

Posted 3 weeks ago

Apply

4.0 - 8.0 years

11 - 16 Lacs

Pune

Work from Office

Some careers shine brighter than others. If you re looking for a career that will help you stand out, join HSBC and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. HSBC is one of the largest banking and financial services organisations in the world, with operations in 64 countries and territories. We aim to be where the growth is, enabling businesses to thrive and economies to prosper, and, ultimately, helping people to fulfil their hopes and realise their ambitions. We are currently seeking an experienced professional to join our team in the role of Senior Consultant Specialist In this role, you will: Design, implement, and manage cloud infrastructure on Google Cloud Platform (GCP). Automate infrastructure provisioning, configuration, and deployment using tools like Terraform, Ansible, or Cloud Deployment Manager. Build and maintain CI/CD pipelines using tools like Jenkins, GitLab CI/CD, or Cloud Build. Monitor and optimize cloud resources for performance, cost, and scalability using tools like Stackdriver, Prometheus, or Grafana. Implement and manage containerized applications using Docker and orchestration tools like Kubernetes (GKE). Ensure security best practices, including IAM policies, network security, and data encryption. Collaborate with development teams to streamline the software delivery process and improve system reliability. Troubleshoot and resolve infrastructure and deployment issues in production and non-production environments. Implement disaster recovery and backup strategies for critical systems and data. Stay updated with the latest GCP services and DevOps tools to recommend improvements. Requirements To be successful in this role, you should meet the following requirements: Hands-on experience with Google Cloud Platform (GCP) services, including Compute Engine, Cloud Storage, Cloud Functions, BigQuery, Pub/Sub, and GKE. Strong knowledge of Infrastructure as Code (IaC) tools like Terraform, Cloud Deployment Manager. Proficiency in building and managing CI/CD pipelines. Experience with Kubernetes and container orchestration (preferably Google Kubernetes Engine - GKE). Strong scripting skills in Python for automation. Familiarity with monitoring and logging tools like Google Cloud Operations Suite (formerly Stackdriver), Prometheus, or Grafana. Knowledge of networking concepts, including VPCs, firewalls, load balancers, and DNS. Experience with version control systems like Git and branching strategies. Understanding of security best practices, including IAM, secrets management, and vulnerability scanning. Strong problem-solving and troubleshooting skills

Posted 3 weeks ago

Apply

5.0 - 8.0 years

7 - 10 Lacs

Bengaluru

Work from Office

SENIOR EXPERT ENGINEER role for the Vulnerability Management Services team. Designation: Senior Expert Engineer Location: Mumbai ( Onsite) Experience: 5 to 8 years Here are the Job Responsibilities: - Execute vulnerability scanning and manage VM programs for clients Complete the projects within budgeted efforts and agreed timelines with high quality deliverables - Perform vulnerability scanning using different scanning solutions including SAINT, Nessus, Tenable.io, Tenable.sc, Qualys, etc. - Gain good understanding of client network architecture and infrastructure to be scanned - Be involved in threat identification, vulnerability identification and control analysis - Develop customized reports and dashboards as per client expectations - Be proactive in project planning and execution - Perform likelihood determination, impact analysis and risk determination - Showcase prioritization of risks including solution recommendation and documentation - Identify and infer the business risk posed by the weaknesses identified during the assessments - Engage with both business and technical teams within and outside the organization from a project scope definition, project execution, project closure perspectives Skills required: 5+ year of experience in Vulnerability Scanning - Expertise in Vulnerability Scanning tools such as Qualys, Tenable, Rapid7, etc. - Experience with understanding and explaining vulnerabilities to stakeholders - Good knowledge of various platforms such as Windows, Linux, Unix, Mac OS, Cisco, Juniper, etc. - Insights on standards such as PCIDSS, CIS Benchmarks, etc. - Flexible in working on challenging activities and creative in problem solving - Good communication and writing skills with ability to talk fluently #LinkedIn

Posted 3 weeks ago

Apply

5.0 - 8.0 years

7 - 10 Lacs

Bengaluru

Work from Office

SENIOR EXPERT ENGINEER role for the Vulnerability Management Services team. Designation: Senior Expert Engineer Location: Mumbai ( Onsite) Experience: 5 to 8 years Here are the Job Responsibilities: - Execute vulnerability scanning and manage VM programs for clients Complete the projects within budgeted efforts and agreed timelines with high quality deliverables - Perform vulnerability scanning using different scanning solutions including SAINT, Nessus, Tenable.io, Tenable.sc, Qualys, etc. - Gain good understanding of client network architecture and infrastructure to be scanned - Be involved in threat identification, vulnerability identification and control analysis - Develop customized reports and dashboards as per client expectations - Be proactive in project planning and execution - Perform likelihood determination, impact analysis and risk determination - Showcase prioritization of risks including solution recommendation and documentation - Identify and infer the business risk posed by the weaknesses identified during the assessments - Engage with both business and technical teams within and outside the organization from a project scope definition, project execution, project closure perspectives Skills required: 5+ year of experience in Vulnerability Scanning - Expertise in Vulnerability Scanning tools such as Qualys, Tenable, Rapid7, etc. - Experience with understanding and explaining vulnerabilities to stakeholders - Good knowledge of various platforms such as Windows, Linux, Unix, Mac OS, Cisco, Juniper, etc. - Insights on standards such as PCIDSS, CIS Benchmarks, etc. - Flexible in working on challenging activities and creative in problem solving - Good communication and writing skills with ability to talk fluently #LinkedIn

Posted 3 weeks ago

Apply

5.0 - 8.0 years

7 - 11 Lacs

Bengaluru

Work from Office

SENIOR EXPERT ENGINEER role for the Vulnerability Management Services team. Designation: Senior Expert Engineer Location: Mumbai ( Onsite) Experience: 5 to 8 years Here are the Job Responsibilities: - Execute vulnerability scanning and manage VM programs for clients Complete the projects within budgeted efforts and agreed timelines with high quality deliverables - Perform vulnerability scanning using different scanning solutions including SAINT, Nessus, Tenable.io, Tenable.sc, Qualys, etc. - Gain good understanding of client network architecture and infrastructure to be scanned - Be involved in threat identification, vulnerability identification and control analysis - Develop customized reports and dashboards as per client expectations - Be proactive in project planning and execution - Perform likelihood determination, impact analysis and risk determination - Showcase prioritization of risks including solution recommendation and documentation - Identify and infer the business risk posed by the weaknesses identified during the assessments - Engage with both business and technical teams within and outside the organization from a project scope definition, project execution, project closure perspectives Skills required: 5+ year of experience in Vulnerability Scanning - Expertise in Vulnerability Scanning tools such as Qualys, Tenable, Rapid7, etc. - Experience with understanding and explaining vulnerabilities to stakeholders - Good knowledge of various platforms such as Windows, Linux, Unix, Mac OS, Cisco, Juniper, etc. - Insights on standards such as PCIDSS, CIS Benchmarks, etc. - Flexible in working on challenging activities and creative in problem solving - Good communication and writing skills with ability to talk fluently #LinkedIn

Posted 3 weeks ago

Apply

2.0 - 11.0 years

17 - 18 Lacs

Pune

Work from Office

Some careers shine brighter than others. If you re looking for a career that will help you stand out, join HSBC and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. HSBC is one of the largest banking and financial services organisations in the world, with operations in 64 countries and territories. We aim to be where the growth is, enabling businesses to thrive and economies to prosper, and, ultimately, helping people to fulfil their hopes and realise their ambitions. We are currently seeking an experienced professional to join our team in the role of Senior Software Engineer. In this role, you will: 1. IT Risk & Control Management Work with the Risk and Controls team and Windows team for the CIB GTS Technology Value Stream Assist service owners in responding appropriately and effectively to firm-wide risk, cyber and corporate control initiatives Partner with service owners and Value Stream/Sub-Value Stream leads and head to identify and assess controls, determine mitigating actions and remediation activities, and understand the overall risk profile Partner with CIB Tech. RCOs to ensure departmental requirements are taken into account Provide visibility of status of action plans and external/internal audit issues Review allocation of issues to Value stream and agree categorization of high/medium/low. Approve the raising and closure of issues, action plans, but look to automate process Triage the issue/risk acceptance process Managing on going Control Effectiveness via Control KCI data across Value stream Act as a gatekeeper in collection of artefacts and / or evidence for control remediation related audit or regulatory assessment. 2. Windows Server Security Manage Windows Server security patches, updates, and vulnerability remediation (WSUS, SCCM, or manual deployments). Audit and enforce Group Policies (GPOs), user access controls, and least-privilege principles. Collaborate with SysAdmins to harden servers (e. g. , disabling legacy protocols, configuring firewalls, logging). 3. Stakeholder Management/Governance: Partner with the CIB Tech central teams CCO Tech, CyberSec, Service Mgmt. team and Risk Functions to promote and provide guidance to relevant policies, standards and governance within GBM Provide stakeholder updates with respect to global Technology Control uplift programs Work with internal / external / client audit and Regulatory Exams, including oversight of field work, collation of artefacts and partnership with CCO Tech to remediate issues Attend relevant governance forums and where applicable provide appropriate MI Communicate residual risk through reporting, business/technology governance processes and forums Requirements To be successful in this role, you should meet the following requirements: 3+ years of relevant IT experience, including exposure to Risk & Controls / Cyber Security experience. With hands-on Windows Server administration. Understanding of IT infrastructure and Application architects particularly in banking domain. Windows Server security (2016/2019/2022): Patch management, GPOs, Active Directory. Vulnerability scanning tools (Nessus, Qualys, Rapid7) for Windows environments. Hands on experience on risk and control management tools and process Proficient with using Excel, Macros, JIRA and Powerpoint Excellent in verbal and written communication skills. Must demonstrate, collaboration, open communication and reaching across functional borders. Be flexible to work with wide range of people across globe having diverse cultural and professional background. You ll achieve more when you join HSBC. .

Posted 3 weeks ago

Apply

2.0 - 7.0 years

4 - 9 Lacs

Chennai

Work from Office

GKN Automotive is a world-leading global automotive technology company at the forefront of innovation. Its origins date back to 1759 and for the last 70 years it has been putting key technologies into series production. We are the trusted partner for most of the world s automotive companies, specialising in developing, building, and supplying market-leading drive systems and advanced ePowertrain technologies. GKN Automotive is part of Dowlais Group plc, a specialist engineering group focused on the automotive sector. What you ll do: The Cyber Defence Analyst plays a meaningful role in improving the organisation s security posture by bridging the gap between incident response and vulnerability management. Operating in a hybrid model, this role works closely with a supplier landscape that provides first-line monitoring and escalates incidents for further investigation. As such, the Cyber Defence Analyst is expected to operate at a level capable of handling complex investigations, leading response efforts, and driving remediation activities. This role supports both the Security Monitoring and Vulnerability Management functions, ensuring a cohesive, end-to-end approach to cyber defence. By responding to threats in real time and proactively reducing the organisation s exposure to future risks, the Cyber Defence Analyst helps maintain a resilient and unified security operation. As this role operates within a dynamic Security Operations environment, there may be occasions where you will be required to provide surge capacity in response to emerging security incidents, emerging threats, or urgent vulnerability disclosures. This includes stepping in to support urgent investigations, remediation efforts, or other time-sensitive security activities that may arise to protect the business. Key responsibilities include: Serve between Security Monitoring and Vulnerability Management teams. Act as a key responder to security incidents, driving investigation, containment, and recovery activities. Assist in identifying, assessing, and tracking remediation of vulnerabilities across the organisation. Perform in-depth analysis of security alerts, logs, and telemetry from SIEM, EDR, and other security tools. Support scanning, reporting, and communication of vulnerability data to collaborators. Develop and refine detection logic to improve visibility and reduce false positives, using frameworks such as MITRE ATT&CK. Maintain and improve incident response playbooks, ensuring they reflect current threats and standard methodologies. Know the latest threat actor tactics, techniques, and procedures (TTPs) and apply them to improve defences. Find opportunities to automate repetitive tasks across security monitoring and vulnerability workflows. Promote a unified approach to cyber defence, avoiding siloed operations. Support initiatives that strengthen the organisation s overall cyber resilience. What you ll need: Demonstrable experience in information security, with a focus on security operations. Proven track record in stakeholder and partner/vendor management and collaboration across various groups. Experience handling incidents and supporting complex investigations. Hands-on experience with technical tools commonly used in Security Operations, including but not limited to SIEM platforms (e.g., Microsoft Sentinel), Endpoint Detection and Response (EDR) solutions, Threat Intelligence platforms (e.g., KELA), and Vulnerability Management tools (e.g., Qualys). Confident in analysing logs from various sources such as endpoints, networks & cloud services. Ability to apply threat intelligence to enrich investigations. Good understanding of relevant threat actors, relevant frameworks and CVSS scoring Ability to script or automate tasks. Familiarity with infrastructure, cloud, and application security principles. Able to write reports and tailor them to a mixture of collaborators. While certifications are not a strict requirement, they can improve a candidate s profile by demonstrating relevant expertise. Any recognised security certifications will be considered, with value placed on those that demonstrate expertise in core blue team disciplines, as well as vulnerability and risk management. Why you ll love working here: Market-leading company with lots of potential Opportunity to take part in brand-new company projects Attractive salary and benefits at a stable and financially healthy company An organisation where you can commit to the long-term Working in the OneIT team with colleagues around the globe

Posted 3 weeks ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Bengaluru

Work from Office

col-tn-12 col-lg-8 padding-0 centered"> About this position About this Position: Analysis, Coordinate the containment and eradication of malicious activities with internal and external parties and investigate, document, and report on any information security (InfoSec) issues What you ll do: Monitor, analyze, prioritize security events & perform remediation by utilizing playbooks Threat and vulnerability analysis by leveraging data from different tools and sources - utilize case management tool Investigate on aggregated security events from SIEM solution Mitigate risks before security events reach critical infrastructure Investigate, document, and report on any information security (InfoSec) issues as well as emerging trends Analysis and response to previously unknown hardware and software vulnerabilities Coordinate the containment and eradication of malicious activities with internal and external parties Notify appropriate business stakeholders about serious security events Implement security improvements by assessing current situation, evaluating market trends, and anticipating requirements What makes you a good fit: Masters degree in computer science or IT/Engineering with focus on IT security 5 years of broad professional experience in a similar role Deep understanding of how a state-of-the-art Security Operation Center operates and common tools used within a SOC Experience in use of The Hive and Elasticsearch are beneficial A certification or qualification in the context of IT security with reference to Red Team/Blue Team would be highly desirable Well-settled experience in IT security management with the ability to deep-dive into technical topics Proven analytical and report writing skills and Fluent in English Start-up mentality and the willingness to develop together in a young team Some perks of joining Henkel: Flexible work scheme with flexible hours, hybrid work model, and work from anywhere policy for up to 30 days per year Diverse national and international growth opportunities Globally wellbeing standards with health and preventive care programs Gender-neutral parental leave for a minimum of 8 weeks Employee Share Plan with voluntary investment and Henkel matching shares Best-in-class Group Medical Insurance policy covering employee, spouse and up to 2 children Competitive accident and term life policies for up to 3 times annual gross salary Progressive OPD policy of INR 30,000 for employee, spouse and up to 2 children

Posted 3 weeks ago

Apply

8.0 - 13.0 years

14 - 19 Lacs

Bengaluru

Work from Office

At Cepheid, we are passionate about improving health care through fast, accurate diagnostic testing. Our mission drives us, every moment of every day, as we develop scalable, groundbreaking solutions to solve the world s most complex health challenges. Our associates are involved in every stage of molecular diagnostics, from ideation to development and delivery of testing advancements that improve patient outcomes across a range of settings. As a member of our team, you can make an immediate, measurable impact on a global scale, within an environment that fosters career growth and development. Cepheid is proud to work alongside a community of six fellow Danaher Diagnostics companies. Together, we re working at the pace of change on diagnostic tools that address the world s biggest health challenges, driven by knowing that behind every test there is a patient waiting. Learn about the Danaher Business System which makes everything possible. Cepheid is looking for a Lead Product Security Engineer responsible for the end-to-end security of Cepheid product(s) and working closely with software engineering and product security council in achieving product and security objectives. We are looking for passionate security professional with experience of working with software/application development, in a regulated industry supporting the implementation of secure development practices, threat modeling, architecture, design, vulnerability assessment and security verification/validation. This position is for Cepheid team located at Danaher India Development Center (IDC), Bangalore IDC is a research and development center with the vision of accelerating product roadmaps across various Danaher business segments. Started in 2014, the center now hosts 500+ associates, for multiple Danaher operating companies. The IDC workforce comprises of various product engineering teams, working on development of software and hardware components of cutting-edge products for, Immunoassay, Chemistry, Hematology, Molecular diagnostics, and Oncology, IDC has evolved as center of excellence for Cloud and data analytics, with significant contributions to the key informatics solutions. The teams consist of highly skilled software & hardware engineers and development managers. The teams are supported by local Product managers, Quality & Regulatory and Intellectual property specialists. The inhouse teams works in close coordination with other global R&D centers at US, France, Germany, Japan, Australia, Denmark and Sweden. Located at the center of Bangalore IT HUB, IDC is housed at state of art facility, measuring 120 K Sqft. In this role, you will have the opportunity to: Serve as a technical leader and mentor other product security engineers Develop/contribute success criteria for security product/solution testing Lead/contribute to vulnerability/incident assessment as per our defined process Address vulnerabilities and maintain product security posture The essential requirements of the job include: Engineering degree in Computer Science or equivalent 8+ Years of Relevant Experience Execute and Manage penetration testing, SAST, vulnerabilities assessment, threat modeling, security risk assessment across Cepheids products. Build cybersecurity controls, assess existing security controls, review security architecture and build security requirements and roadmaps for Cepheid systems. Knowledgeable in key aspects of the hardware; software, protocols, cloud and related infrastructure technology stack. Build product security capabilities, tools, and help automate where possible driving improvements to Cepheid product security processes and practices It would be a plus if you also possess previous experience in: Specialization in Cybersecurity preferred Industry experience in a regulatory environment. Working knowledge in Cybersecurity with software/application or product development. At Danaher, you can build a career in a way no other company can duplicate. Our brands allow us to offer dynamic careers across multiple industries. Were innovative, fast-paced, results-oriented, and we win. We need skilled people to keep winning. Here youll learn how DBS is used to shape strategy, focus execution, align our people, and bring value for customers and shareholders. Come join our winning team. Danaher is committed to competitive compensation that typically has key components including base salary, variable annual incentive compensation based on personal and company performance, and long-term incentive. Equal Opportunity Employer Danaher Corporation and all Danaher Companies are equal opportunity employers that evaluate qualified applicants without regard to race, color, national origin, religion, sex, age, marital status, disability, veteran status, sexual orientation, gender identity, or other characteristics protected by law. Join our winning team today. Together, we ll accelerate the real-life impact of tomorrow s science and technology. We partner with customers across the globe to help them solve their most complex challenges, architecting solutions that bring the power of science to life. For more information, visit www.danaher.com . At Danaher, we value diversity and the existence of similarities and differences, both visible and not, found in our workforce, workplace and throughout the markets we serve. Our associates, customers and shareholders contribute unique and different perspectives as a result of these diverse attributes.

Posted 3 weeks ago

Apply

8.0 - 13.0 years

17 - 18 Lacs

Bengaluru

Work from Office

At Cepheid, we are passionate about improving health care through fast, accurate diagnostic testing. Our mission drives us, every moment of every day, as we develop scalable, groundbreaking solutions to solve the world s most complex health challenges. Our associates are involved in every stage of molecular diagnostics, from ideation to development and delivery of testing advancements that improve patient outcomes across a range of settings. As a member of our team, you can make an immediate, measurable impact on a global scale, within an environment that fosters career growth and development. Cepheid is proud to work alongside a community of six fellow Danaher Diagnostics companies. Together, we re working at the pace of change on diagnostic tools that address the world s biggest health challenges, driven by knowing that behind every test there is a patient waiting. Learn about the Danaher Business System which makes everything possible. Cepheid is looking for a Lead Product Security Engineer responsible for the end-to-end security of Cepheid product(s) and working closely with software engineering and product security council in achieving product and security objectives. We are looking for passionate security professional with experience of working with software/application development, in a regulated industry supporting the implementation of secure development practices, threat modeling, architecture, design, vulnerability assessment and security verification/validation. This position is for Cepheid team located at Danaher India Development Center (IDC), Bangalore IDC is a research and development center with the vision of accelerating product roadmaps across various Danaher business segments. Started in 2014, the center now hosts 500+ associates, for multiple Danaher operating companies. The IDC workforce comprises of various product engineering teams, working on development of software and hardware components of cutting-edge products for, Immunoassay, Chemistry, Hematology, Molecular diagnostics, and Oncology, IDC has evolved as center of excellence for Cloud and data analytics, with significant contributions to the key informatics solutions. The teams consist of highly skilled software & hardware engineers and development managers. The teams are supported by local Product managers, Quality & Regulatory and Intellectual property specialists. The inhouse teams works in close coordination with other global R&D centers at US, France, Germany, Japan, Australia, Denmark and Sweden. Located at the center of Bangalore IT HUB, IDC is housed at state of art facility, measuring 120 K Sqft. In this role, you will have the opportunity to: Serve as a technical leader and mentor other product security engineers Develop/contribute success criteria for security product/solution testing Lead/contribute to vulnerability/incident assessment as per our defined process Address vulnerabilities and maintain product security posture The essential requirements of the job include: Engineering degree in Computer Science or equivalent 8+ Years of Relevant Experience Execute and Manage penetration testing, SAST, vulnerabilities assessment, threat modeling, security risk assessment across Cepheids products. Build cybersecurity controls, assess existing security controls, review security architecture and build security requirements and roadmaps for Cepheid systems. Knowledgeable in key aspects of the hardware; software, protocols, cloud and related infrastructure technology stack. Build product security capabilities, tools, and help automate where possible driving improvements to Cepheid product security processes and practices It would be a plus if you also possess previous experience in: Specialization in Cybersecurity preferred Industry experience in a regulatory environment. Working knowledge in Cybersecurity with software/application or product development. At Danaher, you can build a career in a way no other company can duplicate. Our brands allow us to offer dynamic careers across multiple industries. Were innovative, fast-paced, results-oriented, and we win. We need skilled people to keep winning. Here youll learn how DBS is used to shape strategy, focus execution, align our people, and bring value for customers and shareholders. Come join our winning team. Danaher is committed to competitive compensation that typically has key components including base salary, variable annual incentive compensation based on personal and company performance, and long-term incentive. Equal Opportunity Employer Danaher Corporation and all Danaher Companies are equal opportunity employers that evaluate qualified applicants without regard to race, color, national origin, religion, sex, age, marital status, disability, veteran status, sexual orientation, gender identity, or other characteristics protected by law. Join our winning team today. Together, we ll accelerate the real-life impact of tomorrow s science and technology. We partner with customers across the globe to help them solve their most complex challenges, architecting solutions that bring the power of science to life. For more information, visit www.danaher.com . At Danaher, we value diversity and the existence of similarities and differences, both visible and not, found in our workforce, workplace and throughout the markets we serve. Our associates, customers and shareholders contribute unique and different perspectives as a result of these diverse attributes.

Posted 3 weeks ago

Apply

2.0 - 7.0 years

17 - 18 Lacs

Hyderabad

Work from Office

Amazons Perfect Order Experience team works to ensure that buyers receive authentic products in the condition and with the functionality they are expecting. We design and implement policies, tools, and technology innovations to protect the buying experience on Amazon. Our team is looking for an Incident Manger to respond to and mitigate critical and high impact global events and escalations. As an Incident Manager you will be responsible for: Identifying, containing, and resolving time sensitive escalations. Performing analysis of data from a variety of sources to identify possible risk indicators. Performing incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation. Performing escalation trend analysis and reporting. Performing real-time incident handling tasks to support world-wide operations. Analyzing escalations from various sources within Amazon and determining possible root causes. Tracking and documenting incidents from initial detection through final resolution. Writing and publishing techniques, guidance, and reports on incident findings. Serving as technical expert and liaison to law enforcement and legal personnel and explain incident details Coordinating with analysts to correlate threat assessment data. Writing and publishing Correction of Error Reports and after action reviews. Monitoring external data sources to maintain currency of threat condition and determine which security issues may have an impact on POE operations. Presenting deep-dive documents and reports on policy and process gaps leading to senior executives. An ideal candidate will be able to: Exercise strong judgment in areas where policies are not well defined. Understand the implications of new information for both current and future problem-solving and decision-making. Consider the relative costs and benefits of potential actions to choose the most appropriate one. Use logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions, or approaches to problems and recommend the most appropriate course of action. Dissect complex problems to develop and evaluate options and implement solutions. Analyze existing policy and process gaps, and identify solutions to close them. Function effectively in a dynamic, fast-paced environment. 2+ years of employee and performance management experience Bachelors degree or equivalent, or 2+ years of Amazon (blue badge/FTE) experience Work a flexible schedule/shift/work area, including weekends, nights, and/or holidays 1+ years of performance metrics, process improvement or lean techniques experience

Posted 3 weeks ago

Apply

2.0 - 7.0 years

30 - 35 Lacs

Bengaluru

Work from Office

Minimum qualifications: Bachelor's degree or equivalent practical experience. 2 years of experience designing solutions that maintain or enhance the privacy posture of the organization by analyzing and assessing proposed engineering designs (e.g., product features, infrastructure systems) and influencing stakeholders 2 years of experience applying privacy technologies (e.g., differential privacy, automated access management solutions, etc.), and customizing existing solutions and frameworks to meet organizational needs. Experience in Software Architecture, Risk Analysis, Cross-Functional Collaboration, Differential Privacy, Privacy Design Document, Privacy Data Handling. Preferred qualifications: Experience in Analytical, Strategic Thinking, Artificial Intelligence, Machine Learning. Experience in privacy testing in wearables, smart-home or mobile devices. Experience managing multiple requests, while determining resource allocation (e.g., time, prioritization) to solve problems in a fast-paced, changing organization. Domain knowledge in health related privacy designs in wearables, smart-home or mobile devices. Familiarity with mobile and Android platform, and app development. A passion for keeping people and their data safe. About the job In this role, you will review the product designs on Google devices, Home and Health platforms, and provide privacy guidance and requirements for product privacy assurance. The Devices and Services Privacy Team s mission is to work with product/engineering teams on Google devices and platforms to ensure users are confident our products are safe and trustworthy.The Core team builds the technical foundation behind Google s flagship products. We are owners and advocates for the underlying design elements, developer platforms, product components, and infrastructure at Google. These are the essential building blocks for excellent, safe, and coherent experiences for our users and drive the pace of innovation for every developer. We look across Google s products to build central solutions, break down technical barriers and strengthen existing systems. As the Core team, we have a mandate and a unique opportunity to impact important technical decisions across the company. Responsibilities Exercise design and architecture related knowledge to develop and drive technical privacy solutions as well as policy changes alongside engineering teams. Drive privacy solutions into products and services, including early engagement with product and engineering team on the product design; cross-functional collaboration to ensure the privacy excellence for product launches, including with legal and public policy teams; conduct privacy risk assessment and provide guidance and solutions to mitigate identified privacy risks. Post launch support in the form of privacy subject matter analysis for incidents and vulnerability reports.

Posted 3 weeks ago

Apply

8.0 - 13.0 years

50 - 55 Lacs

Bengaluru

Work from Office

Minimum qualifications: Bachelor's degree or equivalent practical experience. 8 years of experience working in one or more of the following areas: security research, malware, reverse engineering. Experience in vulnerability and exploitation or hacking. Experience leading security engineering teams. Preferred qualifications: Experience in software development, SQL or code analysis or Python. About the job There's no such thing as a "safe system" - only safer systems. Our Security team works to create and maintain the safest operating environment for Google's users and developers. As a Security Engineer, you help protect network boundaries, keep computer systems and network devices hardened against attacks and provide security services to protect highly sensitive data like passwords and customer information. Security Engineers work directly with network equipment and actively monitor our systems for attacks and intrusions. You also work with software engineers to proactively identify and fix security flaws and vulnerabilities. You are a recognized expert in at least two security domains and use your leadership skills to manage a team that sets the direction and goals for solving Google-wide problems. You identify fundamental security problems at Google and drives major security improvements in Google infrastructure. The Android Anti-Malware team turns big Android malware problems into small problems. We do this by analysing upcoming, persistent, or severe malware families and malware categories, and by developing detection and mitigation strategies to reduce the harm they can cause to Android users. Android is Google s open-source mobile operating system powering more than 3 billion devices worldwide. Android is about bringing computing to everyone in the world. We believe computing is a super power for good, enabling access to information, economic opportunity, productivity, connectivity between friends and family and more. We think everyone in the world should have access to the best computing has to offer. We provide the platform for original equipment manufacturers (OEMs) and developers to build compelling computing devices (smartphones, tablets, TVs, wearables, etc) that run the best apps/services for everyone in the world. Responsibilities Manage a team of security engineers (malware analysts). Perform reverse engineering, analyze and detect malware at scale. Advocate security and secure practices throughout the Google Play and Android ecosystem. Conduct research to identify potential attack vectors against Android. Work with other team members to improve Android security knowledge of malware and propose methods to detect and mitigate them.

Posted 3 weeks ago

Apply

1.0 - 6.0 years

30 - 35 Lacs

Hyderabad, Bengaluru

Work from Office

Minimum qualifications: Bachelor's degree or equivalent practical experience. 1 year of experience in data analysis, including identifying trends, generating summary statistics, and drawing insights from quantitative and qualitative data. 1 year of experience managing projects and defining project scope, goals, and deliverables. Preferred qualifications: 2 years of experience in the Payments industry, working on risk or fraud management and in one or more of the following areas: statistical analysis and machine learning libraries (e.g., R, Scikit-learn,Tensorflow), programming languages (e.g., Python, C/C++), Large Language Models (LLMs) or Generative AI. Experience in innovation, technology and Google products. Ability to interact with internal and external stakeholders with attention to detail in an ever-changing environment. Ability to identify workflow pain points, optimize, automate and scale processes. Excellent communication, problem-solving and critical thinking skills. About the job Trust & Safety team members are tasked with identifying and taking on the biggest problems that challenge the safety and integrity of our products. They use technical know-how, excellent problem-solving skills, user insights, and proactive communication to protect users and our partners from abuse across Google products like Search, Maps, Gmail, and Google Ads. On this team, you're a big-picture thinker and strategic team-player with a passion for doing what s right. You work globally and cross-functionally with Google engineers and product managers to identify and fight abuse and fraud cases at Google speed - with urgency. And you take pride in knowing that every day you are working hard to promote trust in Google and ensuring the highest levels of user safety. In this role, you will work globally and cross-functionally with Google engineers and product managers to identify and fight abuse and fraud cases at Google speed, in order to ensure a safe and secure Payments ecosystem for our users. You will identify and solve problems and have technical skills to optimize our processes and tools. You will be proactive, motivated, organized, reliable, and able to work well in a fast-paced, global, cross-functional, and team-oriented environment to get things done. You will promote users trust in Google and ensure the highest levels of user safety. At Google we work hard to earn our users trust every day. Trust & Safety is Google s team of abuse fighting and user trust experts working daily to make the internet a safer place. We partner with teams across Google to deliver bold solutions in abuse areas such as malware, spam and account hijacking. A team of Analysts, Policy Specialists, Engineers, and Program Managers, we work to reduce risk and fight abuse across all of Google s products, protecting our users, advertisers, and publishers across the globe in over 40 languages. Responsibilities Investigate fraud and abuse incidents, identify patterns and trends in order to generate risk management solutions. Promote user trust and safety by managing and mitigating payment fraud, scams and abuse on Google products and services. Perform statistical analysis using payments and risk data warehouse, collaborate with engineering and product teams to create and enhance tools, develop signals, improve system functionality, accuracy and efficiency. Facilitate and manage operations programs, working closely with Google engineers, product managers and vendor operations to develop and track project schedules and timelines. Use technical experience to drive and implement automation opportunities. Perform end-to-end assessment of the associated risk and vulnerability of products and features. Respond to escalations from internal and external parties within designated service levels.

Posted 3 weeks ago

Apply

2.0 - 5.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Position Summary Job Description Information Security Analyst: Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Maintains hardware, software and network firewalls and encryption protocols. Administers cybersecurity policies to control physical and virtual access to systems. Performs network security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Conducts penetration testing and vulnerability assessments of applications, operating systems and/or networks. Responds to cybersecurity breaches, identifies intrusions and isolates, blocks and removes unauthorized access. Researches and evaluates cybersecurity threats and performs root cause analysis. Assists in the creation and implementation of security solutions. Provides information to management regarding impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Supervisory Responsibilities This position has no supervisory responsibilities. Job Level Description Works on defined tasks that sometimes require the application of independent judgment. Developing individual contributor. Qualifications Education Bachelors degree in related field. Years of Related Experience Years of experience 2 to 5 years Physical Requirements The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit, stand, walk, bend, use hands, operate a computer, and have specific vision abilities to include close and distance vision, and ability to adjust focus working with computer and business equipment. Work Conditions Scientific Games, LLC and its affiliates (collectively, SG ) are engaged in highly regulated gaming and lottery businesses. As a result, certain SG employees may, among other things, be required to obtain a gaming or other license(s), undergo background investigations or security checks, or meet certain standards dictated by law, regulation or contracts. In order to ensure SG complies with its regulatory and contractual commitments, as a condition to hiring and continuing to employ its employees, SG requires all of its employees to meet those requirements that are necessary to fulfill their individual roles. As a prerequisite to employment with SG (to the extent permitted by law), you shall be asked to consent to SG conducting a due diligence/background investigation on you. This job description should not be interpreted as all-inclusive; it is intended to identify major responsibilities and requirements of the job. The employee in this position may be requested to perform other job-related tasks and responsibilities than those stated above.

Posted 3 weeks ago

Apply

5.0 - 8.0 years

7 - 11 Lacs

Mumbai

Work from Office

About Us At Kodo, we believe managing a fast-growing companys finances and operations shouldnt feel like a juggling act. Thats why we offer a single platform to streamline all purchase decisions, automate repetitive tasks, and simplify payments. From corporate cards with smart controls to accounts payable and procure-to-pay solutions, Kodo equips fast-growing businesses with everything they need to save time, cut costs, and scale easily. Trusted by companies such as Cars24, Mensa Brands, Zetwerk, and many more, Kodo transforms financial chaos into clarity. These teams are empowered with flexible corporate cards, automated vendor payments and reimbursements, and streamlined procurement processes while integrating effortlessly with their ERPs for real-time insights. We have raised $14M from investors such as Y Combinator, Brex, and other global investors. Were on a mission to simplify the CFO stack for fast-growing businesses. We believe in creating exceptional products for our customers, an enriching environment for our team, and a solid business that grows profitably. Location: Pune or Mumbai, India Reports To: Principal Engineer, DevOps Role & Responsibilities Design and automate infrastructure as code on AWS using Terraform for multi-account environments. Build and maintain CI/CD pipelines with Jenkins, GitHub Actions, and ArgoCD to enable daily deployments. Operate and harden Kubernetes clusters, implement auto-scaling and blue-green rollouts for microservices. Establish comprehensive monitoring, logging, and on-call alerting with Prometheus, Grafana, and ELK. Embed security best practices IAM, secrets management, vulnerability scanning, and compliance automation. Mentor engineers, document runbooks, and drive post-incident reviews to foster a blameless SRE culture. Skills & Qualifications Must-Have 5+ years DevOps or SRE experience managing large-scale Linux systems. Expertise with AWS core services (EC2, EKS, VPC, IAM, RDS). Advanced Terraform or CloudFormation proficiency with modular IaC design. Hands-on Kubernetes operations, Helm charting, and container lifecycle management. Proven CI/CD pipeline engineering using Jenkins or GitHub Actions. Strong scripting in Bash or Python for automation and tooling. Preferred GitOps tooling experience with ArgoCD, Flux, or Spinnaker. Operational knowledge of PostgreSQL, Redis, or Kafka on Kubernetes. Familiarity with SOC2, ISO27001, or PCI-DSS compliance. Experience with service mesh such as Istio or Linkerd. Deep observability know-how using Prometheus, Grafana, ELK, or New Relic. Background in FinTech or other regulated, high-uptime domains. Benefits & Culture Highlights High ownership role building green-field cloud platform using latest DevOps tooling. Fast-paced, collaborative culture that values experimentation and continuous improvement. Comprehensive medical cover, learning budget, and daily catered meals.

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies