Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 6.0 years
3 - 6 Lacs
Hyderabad
Work from Office
Hring for Qualys Admin - Hyderabad Required Information Details Role Qualys Admin Required Technical Skill Set Qualys Guard Desired Experience Range 3-6 years Must-Have Must have experience with Qualys vulnerability scanning and reporting. Must have experience troubleshooting issues with database, CyberArk credentials, Qualys Cloud Agents in Windows, Linux, and MacOS. Knowledge of Cloud agent installation and troubleshooting. Good-to-Have Nice to have advanced knowledge of IP networking, routing, firewalling. Experience with developing reports in Qualys and any automation via Qualys API. Web application configuration and scanning.
Posted 1 month ago
8.0 - 10.0 years
25 - 30 Lacs
Bengaluru
Work from Office
Company Profile: Founded in 1976, CGI is among the largest independent IT and business consulting services firms in the world. With 94,000 consultants and professionals across the globe, CGI delivers an end-to-end portfolio of capabilities, from strategic IT and business consulting to systems integration, managed IT and business process services and intellectual property solutions. CGI works with clients through a local relationship model complemented by a global delivery network that helps clients digitally transform their organizations and accelerate results. CGI Fiscal 2024 reported revenue is CA$14.68 billion and CGI shares are listed on the TSX (GIB.A) and the NYSE (GIB). Learn more at cgi.com. Position: Lead Analyst/Associate Consultant Experience: 8 to 12 years Category: Software Development/ Engineering Location: Bangalore / Hyderabad / Chennai / Pune / Mumbai Position ID: J0125-0745 Employment Type: Full Time Education Qualification: Bachelors degree in Computer Science or related field or higher with minimum 8 years of relevant experience. 8+ years of penetration testing experience, preferably in highly regulated industries and for global clients Proficiency with scripting and programming languages, mainly Python Perform Penetration Testing for networks (internal & external), applications, APIs & cloud assessments Vulnerability identification and analysis Collaborate with team members and stakeholders to define project scopes, review test results, and determine remediation steps Advanced problem-solving skills Any security certifications are a plus Strong written and verbal communication skills Ability to work autonomously with little directional oversight Ability to lead a project and multiple testers Commitment to quality and on-schedule delivery; and a proven ability to establish and meet milestones and deadlines Customer-focused mentality to understand and appropriately respond to customers business needs Draft reports and communicate complex security concepts and test findings to clients and stakeholders Make expert recommendations to help clients improve their information security program Work on researching & developing utilities, toolkits, processes, tactics, and techniques Required qualifications to be successful in this role: Must to have skills-Penetration testing, DAST Testing, SAST Testing, OWASP top 10 Good to have skills- Python Skills: Java Python Vulnerability Assessment(IAVA) Vulnerability Testing (IAVT)
Posted 1 month ago
7.0 - 12.0 years
11 - 15 Lacs
Gurugram
Work from Office
industries Overview Banking, financial services and insurance (BFSI) Fintech Media Global Capability Centers Technology Healthcare E-Commerce Oil and Gas Need different solutions Ikrux s scalable solutions adapt to your needs, ensuring robust protection without compromise. Job Category: AWS CI/CD security pipelines python STRIDE Job Type: Full Time Job Location: Gurugram We are hiring for an Application Security Architect with 6 to 9 years of experience for a role based in Gurgaon . The candidate will be responsible for designing and implementing secure application architecture for AWS-hosted environments . Key responsibilities include ensuring secure-by-design initiatives across the SDLC , conducting threat modeling , and producing Architecture Decision Records (ADRs) . The role involves close collaboration with DevOps, software engineers, security teams, and cloud architects . The candidate will define secure coding standards , design CI/CD security pipelines , and integrate tools such as SAST, DAST, MAST, SCA , and IaC scanning . You ll develop security reference architectures for AWS microservices, containers, and serverless setups. The role also involves incident response , vulnerability remediation , and participating in governance, audits, and compliance . Required qualifications include 7+ years in application security or related roles , with 3+ years of hands-on AWS experience using services like IAM, KMS, Terraform, and CodePipeline . Proficiency in Python, Java, Go , or Node.js , along with knowledge of OWASP Top 10 and STRIDE threat modeling , is expected. Security certifications such as GWEB, GPEN , or AWS Certified Solutions Architect are highly desirable.
Posted 1 month ago
2.0 - 5.0 years
5 - 9 Lacs
Bengaluru
Work from Office
YOU MUST HAVE: Bachelor s degree or equivalent work experience in Cyber Security or Information Technology Strong interpersonal skills with the ability to facilitate diverse groups, help negotiate priorities, and resolve conflicts among stakeholders WE VALUE: Understanding of Agile software development practices. Understanding DevsecOps and have a good working understanding of tooling specific to CI/CD pipelines and security tooling. Information Security accreditation (CISSP/CSSLP or other security related certifications) Experience with widely used security tools like SD Elements, BlackDuck Hub, Microsoft Threat modeling tool, SAST (Coverity, SonarQube), DAST (Burp, ZAP, AppSpider), Fuzzing, Vulnerability management and continuous monitoring tools Sound understanding of Cryptography, encryption algorithms, Public Key Infrastructure (PKI), Secure boot and Open-source risk management. YOU MUST HAVE: Bachelor s degree or equivalent work experience in Cyber Security or Information Technology Strong interpersonal skills with the ability to facilitate diverse groups, help negotiate priorities, and resolve conflicts among stakeholders WE VALUE: Understanding of Agile software development practices. Understanding DevsecOps and have a good working understanding of tooling specific to CI/CD pipelines and security tooling. Information Security accreditation (CISSP/CSSLP or other security related certifications) Experience with widely used security tools like SD Elements, BlackDuck Hub, Microsoft Threat modeling tool, SAST (Coverity, SonarQube), DAST (Burp, ZAP, AppSpider), Fuzzing, Vulnerability management and continuous monitoring tools Sound understanding of Cryptography, encryption algorithms, Public Key Infrastructure (PKI), Secure boot and Open-source risk management. Key Responsibilities: Lead efforts with the development teams to manage product risk and apply the appropriate security controls Drive best in class security requirements into product and service offerings. Provide architecture and best practices guidance in building secure Honeywell products. Support product security process activities including threat modeling, security requirements, security reviews, threat vulnerability assessments and risk management for IA applications. Must have product architecture and development background with Secure software development lifecycle experience. Understanding of security by design principles and architecture level security concepts up to date knowledge of current and emerging security threats and techniques for exploiting security vulnerabilities Containers, and VMs, through secure configurations and performing periodic security reviews. Lead efforts in mentoring and training the engineering development community and facilitate adoption of shift-security-to-left practice Lead new initiatives that add value to SDL processes and procedures Key Responsibilities: Lead efforts with the development teams to manage product risk and apply the appropriate security controls Drive best in class security requirements into product and service offerings. Provide architecture and best practices guidance in building secure Honeywell products. Support product security process activities including threat modeling, security requirements, security reviews, threat vulnerability assessments and risk management for IA applications. Must have product architecture and development background with Secure software development lifecycle experience. Understanding of security by design principles and architecture level security concepts up to date knowledge of current and emerging security threats and techniques for exploiting security vulnerabilities Containers, and VMs, through secure configurations and performing periodic security reviews. Lead efforts in mentoring and training the engineering development community and facilitate adoption of shift-security-to-left practice Lead new initiatives that add value to SDL processes and procedures
Posted 1 month ago
4.0 - 10.0 years
9 - 14 Lacs
Chennai
Work from Office
"> Urgent Opening For ServiceNow SecOps Lead Location : Chennai / Hyderabad / Pune Experience : 4 To 10 Year Opportunity : Full Time Desired Competencies (Technical/Behavioral Competency ) Must-Have ServiceNow implementation experience in Security operations Security Incident Response, Vulnerability Response, Threat Intelligence, Configuration Compliance or modules ServiceNow implementation experience in ITSM modules (Incident, Problem, Change, CMDB & Asset not limited to) will be an added advantage. Working experience in implementation of catalog items and record producers. Working experience in configuring Security incident response applications and OOB/ custom integration build with SIEM tool/ TI enrichment tools Experience in building email integration for importing suspicious emails as Security incidents (Phishing use case) Working experience in configuring Vulnerability response applications and integration with one of vulnerability scanner tool Build service requests from customer requirements including requests, request items and tasks using workflows -to manage data flows from the customer to the support teams providing the service Uses scripting tools and Service Now functionality create script to automate rote tasks being done in Service Now. Performs integrations and process automation using Service Now Orchestration. Load, manipulate and maintain data between ServiceNow and other systems. Thorough understanding of ServiceNow Security incident response and Vulnerable Item processes Performs system and integration testing with sample and live data Monitor health, usage, and overall compliance of the application. Job Location: Chennai , Hyderabad , Pune First Name As per Pancard Last Name As per Pancard Email Mobile Number Total Experience Relevant Experience Notice Period --Select-- 30 days 45 days 60 days 90 days Immediate Serving Notice Period Last Working Date Current Location --Select-- Bangalore Hyderabad Mumbai Pune Chennai Kolkata Delhi Noida Gurugram Other Location Certifications Key Skills Upload Your Resume Allowed File Types: .pdf, .doc, .docx, .jpg File size should be below 5 MB. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Submit
Posted 1 month ago
15.0 - 20.0 years
50 - 60 Lacs
Mumbai
Work from Office
A brief about the job: Ayekart is at the forefront of revolutionising the food and agricultural landscape by delivering innovative and impactful solutions tailored to the industry. We seek a dynamic and experienced SVP / VP of Engineering and Delivery to join our team. The ideal candidate should deeply understand the fintech and supply chain industry, particularly B2B SaaS products and API Banking. Key Responsibilities: Leadership Management: Lead and manage a high-performing engineering team, fostering a culture of innovation, collaboration, and continuous improvement. Provide technical guidance, mentorship, and career development for team members. Collaborate with cross-functional teams, including Product, Design, and Operations, to align engineering efforts with business goals. Drive the execution of engineering initiatives, ensuring on-time delivery of high-quality products. System Designs Architecture: Design and oversee the implementation of scalable, secure, and high-performance software architectures. Lead the architectural decisions for complex, distributed systems, ensuring alignment with industry best practices and business requirements. Stay updated with the latest trends in system design and architecture trends to ensure our technology stack remains cutting-edge. Technical Expertise: Hands-on involvement in software development, particularly in Node.js and React.js, to set technical standards and guide the team. Ensure the engineering team can adopt best practices in coding, architecture, and security. Drive innovation in AI technologies, integrating AI/ML models into our fintech product offerings. Added advantage if experienced in Loan Origination Systems (LOS), Loan Management Systems (LMS), Business Correspondents (BC), and Co-lending product development. Implement robust security practices to protect data and ensure compliance with relevant regulations. Lead the development of secure coding practices, conduct regular security audits, and manage vulnerability assessments. Oversee the design and optimisation of database schemas and queries to ensure performance, scalability, and reliability. Ensure the effective use of database technologies, including relational and NoSQL databases. API Banking s Fintech Integration: Strong awareness of API banking and its integration into fintech solutions. Drive the development and integration of API-based services for seamless connectivity with banking and financial systems. AI s Machine Learning: Led the integration of AI/ML technologies into the product, working closely with data scientists and machine learning engineers. Drive AI-driven innovation and identify opportunities to leverage AI for business growth. Contribute to the company s strategic direction by aligning engineering goals with business objectives. Develop and manage the engineering budget, ensuring efficient use of resources. Team Development s Culture: Build and nurture a strong engineering culture that values diversity, inclusion, and professional growth. Organise and participate in code reviews, technical workshops, and team-building activities. Experience: 15+ years of software engineering experience with a strong track record of leadership in a senior engineering and delivery role. Advanced proficiency in Node.js and React.js will be an added advantage. Strong experience in system design, architecture, and distributed systems. In-depth knowledge of security best practices and secure coding standards. Hands-on experience with database technologies (SQL, NoSQL). Experience with AI/ML technologies and their integration into software products. Knowledge and experience with Loan Origination Systems (LOS), Loan Management Systems (LMS), Business Correspondents (BC), and Co-lending product development. Awareness of API banking and fintech integrations. Proven experience in managing and scaling engineering teams. Strong ability to mentor, coach, and develop engineering talent. Ability to align technical initiatives with business goals. Experience in driving innovation and continuous improvement in a fast-paced environment. Soft Skills: Excellent communication and interpersonal skills. Strong problem-solving abilities and decision-making skills. Ability to work collaboratively with cross-functional teams.
Posted 1 month ago
10.0 - 20.0 years
35 - 50 Lacs
Bengaluru
Work from Office
Design, implement, and assess cybersecurity controls across IT and OT environments. Conduct vulnerability assessments, develop secure architectures, and ensure compliance with standards Required Candidate profile Experienced in hands-on cybersecurity engineering and threat assessment with exposure to IT and OT. Strong in vulnerability scanning, architecture reviews, and cross-functional collaboration.
Posted 1 month ago
1.0 - 6.0 years
20 - 25 Lacs
Pune
Work from Office
HackerOne is a global leader in offensive security solutions. Our HackerOne Platform combines AI with the ingenuity of the largest community of security researchers to find and fix security, privacy, and AI vulnerabilities across the software development lifecycle. The platform offers bug bounty, vulnerability disclosure, pentesting, AI red teaming, and code security. We are trusted by industry leaders like Amazon, Anthropic, Crypto.com , General Motors, GitHub, Goldman Sachs, Uber, and the U.S. Department of Defense. HackerOne was named a Best Workplace for Innovators by Fast Company in 2023 and a Most Loved Workplace for Young Professionals in 2024. HackerOne Values HackerOne is dedicated to fostering a strong and inclusive culture. HackerOne is Customer Obsessed and prioritizes customer outcomes in our decisions and actions. We Default to Disclosure by operating with transparency and integrity, ensuring trust and accountability. Employees, researchers, customers, and partners Win Together by fostering empowerment, inclusion, respect, and accountability. Position Summary Based in our Pune 0ffice - 4-5 days a week. As a Triage Analyst at HackerOne, you will be the first point of contact for incoming vulnerability reports. Your role will focus on the initial intake, evaluation, and assignment of these reports, ensuring they are directed to the appropriate triage team members for further analysis. This position is ideal for someone with foundational knowledge of security vulnerabilities who is eager to develop their expertise in vulnerability triage. What You Will Do Initial Intake: Receive and process incoming vulnerability reports, ensuring that all necessary information is included before passing them on to the triage team. Preliminary Assessment: Conduct an initial assessment of the reports to identify obvious false positives and ensure they align with the program s scope. Collaboration: Work closely with the triage team to ensure smooth handoff and follow-up on any required additional information from hackers. Documentation: Assist in maintaining accurate records of report intake and initial findings, supporting the team in tracking and prioritizing reports. Communication: Provide clear and concise communication with hackers regarding the status of their submissions and any missing details required for further evaluation. Continuous Learning: Stay updated on the latest security trends and vulnerabilities to enhance your understanding and support your growth within the triage team. Validation: Responsible for validating quick wins, including redundant or basic vulnerabilities, ensuring they are efficiently and accurately assessed due to their ease and speed of validation. Minimum Qualifications 1+ years of experience working on vulnerability disclosure and bug bounty programs. 1+ years of experience of web application security testing Basic web and mobile application security understanding, including familiarity with the OWASP Top 10. Experience using basic security testing tools (e.g., Burpsuite). Strong attention to detail and ability to follow procedures for initial report intake. Excellent written and verbal communication skills. Self-motivated with a willingness to learn and grow within the security field. Excellent decision making skills Must be able to work from a HackerOne office in Pune 4-5 days per week Able to work shift work. We are hiring for the following shifts: 8am - 5pm IST, 12:30-9.30pm IST, and 6.30pm - 3.30am IST. English fluency India Compensation Bands: 2,160,000 INR - 2,385,000 INR per year #LI-MR1 Job Benefits: Health (medical, vision, dental), life, and disability insurance* Equity stock options Retirement plans Paid public holidays and unlimited PTO Paid maternity and parental leave Leaves of absence (including caregiver leave and leave under COs Healthy Families and Workplaces Act) Employee Assistance Program Flexible Work Stipend *Eligibility may differ by country Were committed to building a global team! For certain roles outside the United States, U.K., and the Netherlands, we partner with Remote.com as our Employer of Record (EOR). Visa/work permit sponsorship is not available. Employment at HackerOne is contingent on a background check. HackerOne is an Equal Opportunity Employer in the terms and conditions of employment for all employees and job applicants without regard to race, color, religion, sex, sexual orientation, age, gender identity or gender expression, national origin, pregnancy, disability or veteran status, or any other protected characteristic as outlined by international, federal, state, or local laws. This policy applies to all HackerOne employment practices, including hiring, recruiting, promotion, termination, layoff, recall, leave of absence, compensation, benefits, training, and apprenticeship. HackerOne makes hiring decisions based solely on qualifications, merit, and business needs at the time. For US based roles only: Pursuant to the San Francisco Fair Chance Ordinance, all qualified applicants with arrest and conviction records will be considered for the position.
Posted 1 month ago
6.0 - 12.0 years
11 - 15 Lacs
Hyderabad
Work from Office
Job Description We are seeking a highly skilled Lead DevOps Engineer with strong On-Premise infrastructure expertise to join our team and drive the end-to-end deployment, scalability, and operationalization of machine learning models in production. You will collaborate closely with data scientists, data engineers, and DevOps teams to ensure seamless CI/CD, reproducibility, monitoring, and governance of ML pipelines. Key Responsibilities Design, implement, and maintain CI/CD pipelines for deploying and monitoring microservices efficiently in on-premise environments. Manage infrastructure as code using Terraform (or equivalent on-prem solutions) for repeatable and scalable provisioning. Deploy and optimize containerized applications using Docker across on-premise environments, integrating with systems such as Harbor (or other private registries), Vault, and on-prem messaging/file storage solutions. Apply best practices for securing Docker images, including vulnerability scanning, reducing image size, and optimizing build efficiency. Implement and maintain centralized logging, monitoring, and alerting systems (e.g., Prometheus, Grafana, ELK stack) to ensure system reliability and observability. Ensure security best practices across on-prem environments, including secrets management, access control, and compliance with organizational policies. (Nice to have) Design and manage multi-client architectures within shared pipelines and storage solutions (e.g., NFS, Object Storage). Qualifications 6+ years of experience in DevOps or MLOps with a strong focus on production-grade ML solutions in on-premise infrastructure. Strong expertise in CI/CD tooling, container orchestration (Docker, Kubernetes on-prem clusters), and on-premise infrastructure security. Proficiency in Terraform (or Ansible, Puppet, or similar tools) for infrastructure automation. Deep understanding of Docker, including best practices for securing, optimizing, and managing images. Experience implementing centralized logging and monitoring using on-prem tools (e.g., ELK, Prometheus, Grafana). Experience with security best practices, including secrets management, role-based access, and compliance in an on-premise environment. Experience with Docker Compose for local development and multi-container orchestration.
Posted 1 month ago
0.0 - 3.0 years
22 - 25 Lacs
Pune
Work from Office
Evaluate assigned vulnerability reports submitted by hackers to determine the validity, risk and severity to HackerOne customers Collaborate with hackers to address missing information from reports as well as educate the HackerOne community members when reports are invalid Compose a technical summary for each valid report that includes clear and concise details regarding the impact, steps to reproduce and remediation advice Ensure clear and efficient communication between hackers and customers Proactively identify and solve issues, as well as accept and quickly respond to delegated work; as we are distributed, being able to win as a team to solve problems is critical to our success Assess vulnerability findings and determine whether the submission is valid based on program policies, scope and impact. Independently reproduce reported vulnerabilities in a test environment and compose a technical summary for valid findings. Minimum Qualifications Proven experience with vulnerability disclosure and bug bounty (experience managing a bug bounty program is a plus but not required) Hands-on experience doing security testing or ethical hacking on web and mobile applications Strong technical knowledge of OWASP top 10 Comfortable using security testing tools including Burpsuite Excellent written and verbal communication skills Experience using frameworks such as CVSS Self-motivated and able to manage your time and energy output while maintaining a consistent and sustainable operational rhythm This role is based in our Pune office and you must be able to work 4-5 days a week in office You must be open to and flexible around shift work., English fluency
Posted 1 month ago
1.0 - 2.0 years
1 - 5 Lacs
Vadodara
Work from Office
Security Engineer - IT Services and Software Development company We are looking for a Security Engineer with 1 to 2 years of experience to help protect and secure our IT infrastructure. The role involves monitoring systems, conducting vulnerability assessments, and responding to security incidents. Key Responsibilities Monitor and respond to security threats and incidents. Perform vulnerability assessments and implement security best practices. Manage security tools (e.g., firewalls, SIEM, antivirus). Assist in system hardening and patch management. Help develop and enforce security policies. Collaborate with IT teams on security initiatives. Requirements Bachelor s degree in Computer Science, Information Security, or related field. 1 to 2 years of experience in cybersecurity or related roles. Knowledge of firewalls, VPN, encryption, and security tools. Familiarity with cloud security (AWS, Azure, GCP) and web application security is a plus Basic experience with vulnerability scanning and penetration testing. Strong problem-solving and communication skills. Good communication and collaboration skills. Security certifications (e.g., CompTIA Security+, CEH) are a plus.
Posted 1 month ago
5.0 - 10.0 years
3 - 7 Lacs
Mumbai
Work from Office
Network Security Engineer Job Description Sizing, Design, Deploy & Manage Firewall, IPS, Content Filtering & other NGFW functionalities - FortiGate /Palo Alto. Administrative experience on Network & Network Security builds spanned across Switching, Dynamic routing, Data communication and relevant protocols, various clustering mechanisms Extensive experience on Citrix based Load Balancers & Web Application Firewalls Experience on managing & supporting Cisco ISE Based TACACS Good Understanding on Data Center technologies like Virtualization, SDN/NFV using NSX, Hyper-Convergence, and other concepts within VMware needed for Network/Network Security DC Designs Understanding on concepts like Micro-Segmentation within NSX, FortiGate & Arista, Public & Private Cloud offerings within the Network Security space Experience on handling Major incidents which involves working with different stake holders for incident resolution Experience or Ability for the Root cause analysis Experience on supporting Security Assurance Tasks like Vulnerability Closure, Configuration Compliance, Risky Rule Review Support Security Incident Detection, response & mitigation Team Player with capability to train junior team members as required Familiar with ITIL framework Certifications Preferred: FortiGate / Palo Alto Total Experience: Minimum 5 years experience in infra security domain Level: Consultant / Sr. Consultant Shift: 24*7 shifts. Location: Any (Mumbai, Bangalore, Pune, Hyderabad, Chennai) (WFH + Work from office in hybrid mode)
Posted 1 month ago
4.0 - 9.0 years
6 - 11 Lacs
Gurugram
Work from Office
Key Responsibilities: Conduct red team exercises to simulate sophisticated, real-world attacks and evaluate the effectiveness of security controls. Perform targeted penetration tests and vulnerability assessments to uncover and exploit security weaknesses. Develop and execute complex attack scenarios to challenge the organizations defenses. Collaborate with defensive security teams to remediate identified vulnerabilities and enhance security measures. Utilize and integrate advanced offensive security tools, such as Metasploit, Burp Suite, and Kali Linux, into the red team testing framework. Provide expert analysis and interpretation of red team tools and their results. Create and maintain detailed documentation related to red team activities, including test plans, attack scenarios, and incident response procedures. Contribute to the development and delivery of specialized security training and awareness programs focused on red team techniques. Ensure design and implementation of security controls and best practices from a red team perspective. Support the Offensive Security Lead in developing and refining the red team program. Assist with the evaluation and implementation of new red team technologies and improvements to existing processes. Qualifications: Bachelor s degree in computer science, Information Security, or a related technical field. 4+ years of experience in offensive security, with a focus on penetration testing and red teaming. In-depth understanding of encryption technologies, authentication protocols, and other security mechanisms. Preferred Skills: Relevant security certifications (e.g., OSCP, OSCE, CEH, GPEN). Key Responsibilities: Conduct red team exercises to simulate sophisticated, real-world attacks and evaluate the effectiveness of security controls. Perform targeted penetration tests and vulnerability assessments to uncover and exploit security weaknesses. Develop and execute complex attack scenarios to challenge the organizations defenses. Collaborate with defensive security teams to remediate identified vulnerabilities and enhance security measures. Utilize and integrate advanced offensive security tools, such as Metasploit, Burp Suite, and Kali Linux, into the red team testing framework. Provide expert analysis and interpretation of red team tools and their results. Create and maintain detailed documentation related to red team activities, including test plans, attack scenarios, and incident response procedures. Contribute to the development and delivery of specialized security training and awareness programs focused on red team techniques. Ensure design and implementation of security controls and best practices from a red team perspective. Support the Offensive Security Lead in developing and refining the red team program. Assist with the evaluation and implementation of new red team technologies and improvements to existing processes. Qualifications: Bachelor s degree in computer science, Information Security, or a related technical field. 4+ years of experience in offensive security, with a focus on penetration testing and red teaming. In-depth understanding of encryption technologies, authentication protocols, and other security mechanisms. Preferred Skills: Relevant security certifications (e.g., OSCP, OSCE, CEH, GPEN).
Posted 1 month ago
6.0 - 8.0 years
8 - 10 Lacs
Chennai, Bengaluru
Work from Office
What awaits you/ Job Profile This role focuses on enhancing and monitoring cybersecurity measures within the software development lifecycle. The analyst creates security-related documentation, performs conformity checks, identifies IT risks, and ensures compliance with industry standards and best practices. What should you bring along Create cyber security related artefacts, such as IT risk reports, conformity checks and cyber threat modeling (OWASP) Monitor the software development process, performing configuration management, identifying safety, performance, and compliance issues Identify potential IT risks, including cybersecurity threats, system vulnerabilities, and compliance gaps Analyze the potential impact of these risks on the business and its customers and assess the likelihood and severity of risks Ensure IT systems and processes comply with relevant regulations and organizational policies Stay informed about changes in regulations and industry best practices Conduct risk assessments and audits Provide training and awareness programs on IT risk management Support IT projects and initiatives related to risk management Must have skill Strong understanding of IT compliance requirements and security principles, Cyber threat modeling (OWASP) Proficiency in risk evaluation and documentation. Ability to implement security monitoring solutions and respond to security incidents effectively. Experience in conducting vulnerability assessments and penetration testing for cloud applications. Understanding of integrating security into DevOps practices to ensure secure application development and deployment.
Posted 1 month ago
6.0 - 9.0 years
8 - 11 Lacs
Hyderabad
Work from Office
We are seeking a highly skilled Lead DevOps Engineer with strong On-Premise infrastructure expertise to join our team and drive the end-to-end deployment, scalability, and operationalization of machine learning models in production. You will collaborate closely with data scientists, data engineers, and DevOps teams to ensure seamless CI/CD, reproducibility, monitoring, and governance of ML pipelines. Key Responsibilities Design, implement, and maintain CI/CD pipelines for deploying and monitoring microservices efficiently in on-premise environments. Manage infrastructure as code using Terraform (or equivalent on-prem solutions) for repeatable and scalable provisioning. Deploy and optimize containerized applications using Docker across on-premise environments, integrating with systems such as Harbor (or other private registries), Vault, and on-prem messaging/file storage solutions. Apply best practices for securing Docker images, including vulnerability scanning, reducing image size, and optimizing build efficiency. Implement and maintain centralized logging, monitoring, and alerting systems (e.g., Prometheus, Grafana, ELK stack) to ensure system reliability and observability. Ensure security best practices across on-prem environments, including secrets management, access control, and compliance with organizational policies. (Nice to have) Design and manage multi-client architectures within shared pipelines and storage solutions (e.g., NFS, Object Storage). 6+ years of experience in DevOps or MLOps with a strong focus on production-grade ML solutions in on-premise infrastructure. Strong expertise in CI/CD tooling, container orchestration (Docker, Kubernetes on-prem cl
Posted 1 month ago
8.0 - 10.0 years
25 - 30 Lacs
Bengaluru
Work from Office
Job Title: Service Now Developer (TPRM) Location: Chennai, Bangalore, Mumbai, Noida Experience: 8-10 Years Shift Timings: 9:30am to 6:30pm Work Mode: C2H Job Description: We are seeking a highly experienced ServiceNow Consultant with strong expertise in implementing and supporting a combination of Third Party Risk Management (TPRM) , Governance Risk & Compliance (GRC) or Integrated Risk Management (IRM) , and Security Operations (SecOps) modules. The ideal candidate should also have working experience in IT Operations Management (ITOM) , including CMDB and Service Mapping . Required Skills: Strong hands-on experience with ServiceNow TPRM and GRC/IRM modules. Proven implementation knowledge of SecOps (Security Incident Response, Vulnerability Response). Experience in ITOM suite, including CMDB , Discovery , and Service Mapping . Proficiency in ServiceNow development (JavaScript, Glide APIs, UI Policies, Business Rules). Solid understanding of ITIL framework and risk/compliance methodologies. Excellent communication and stakeholder management skills.
Posted 1 month ago
5.0 - 8.0 years
6 - 10 Lacs
Pune
Work from Office
Experience and Technical Expertise: - Strong experience(3+ years) working with Splunk in a security operations environment. Deep knowledge of Splunks components (indexers, forwarders, search heads, and deployment servers). Experience in creating and tuning SPL queries , developing Splunk apps , and managing Splunk Enterprise Security (ES). Hands-on experience in data parsing, normalization , and event correlation using Splunk. Proficient in integrating third-party tools , such as firewalls, intrusion detection systems (IDS), and vulnerability scanners, with Splunk. Security Knowledge: Strong understanding of SIEM use cases for security monitoring and incident detection. Knowledge of network security, endpoint security, cloud security, and threat intelligence integration within a SIEM context. Experience in detecting and responding to cybersecurity threats (e.g., malware, DDoS attacks, insider threats, APTs). Cloud and Hybrid Environments: Experience with hybrid environments, where on-premises and cloud data sources are integrated into Splunk. Familiarity with deploying and managing Splunk in cloud environments (e.g., AWS, Azure, Google Cloud). Collaboration and Communication: Strong communication skills to work with cross-functional teams (SOC, IT, Compliance, etc.) and translate security data into actionable business insights. Ability to communicate technical information effectively to both technical and non-technical stakeholders. Problem-Solving and Troubleshooting: Strong troubleshooting skills, particularly when dealing with complex data integration or performance issues in a Splunk environment. Ability to identify root causes of security issues and design effective solutions using Splunk. Data Analytics and Reporting Skills: Ability to design and build custom dashboards, reports, and alerts to provide actionable insights from security data. Proficiency in data visualization to communicate findings to both technical and non-technical stakeholders. Knowledge of KPI and metric tracking for security and operational effectiveness. Scripting and Automation: Proficiency in scripting languages such as Python, Bash, or PowerShell for automation tasks. Experience with Splunk REST API or SDKs to automate processes or integrate Splunk with other tools in the ecosystem. Certifications: Splunk Certified Power User or Splunk Certified Admin certification is typically required or highly preferred. Splunk Certified Security Admin or Splunk Certified Security Specialist for those focusing on security-related roles. Roles and Responsibilities of a Splunk SME: (Standard) Splunk Platform Implementation and Configuration: - Lead the deployment, configuration, and integration of Splunk with various data sources and security tools. Ensure that Splunk instances (indexers, forwarders, search heads) are set up correctly and optimized for performance. Customize Splunk for different security use cases (e.g., monitoring, incident detection, compliance reporting). Data Collection and Ingestion: - Configure data inputs, forwarders, and data parsers for various log sources (e.g., network devices, firewalls, endpoints, servers). Set up log forwarding and ensure efficient and secure data collection from a wide range of security and IT systems. Ensure data normalization and correlation to make it usable for analysis and detection. Search and Query Optimization: - Design and develop complex SPL (Search Processing Language) queries to analyse security data. Optimize searches for performance and efficiency, especially when working with large datasets. Create and maintain reports, dashboards, and alerts for security monitoring and incident response. Incident Detection and Response: - Use Splunk to monitor security events in real-time, identifying potential threats and anomalies. Configure and fine-tune Splunks correlation searches and alerts to ensure accurate detection of security incidents (e.g., intrusions, breaches). Work with security operations teams to investigate incidents and provide actionable insights from Splunk data. Security Monitoring and Threat Intelligence Integration: Integrate external threat intelligence feeds into Splunk to enhance security monitoring. Leverage Splunk s machine learning capabilities to identify patterns of suspicious activity. Create custom detection rules, machine learning models, and analytics to detect emerging threats. Reporting and Compliance: - Generate and deliver automated security reports (e.g., for compliance frameworks like GDPR, PCI-DSS, HIPAA). Ensure that Splunk data is properly indexed, categorized, and stored to support compliance and auditing requirements. Create dashboards and visualizations for executives, managers, and technical teams to track security posture. Splunk Tuning and Optimization: - Perform regular health checks of the Splunk environment to ensure high availability, scalability, and performance. Tune Splunk configurations (indexing, search, data storage) to maintain optimal performance, especially during peak event loads. Troubleshoot and resolve issues related to Splunk performance, data accuracy, or integration challenges. Collaboration and Knowledge Sharing: - Work with other security teams (e.g., SOC, Incident Response, Threat Intelligence) to align Splunk s capabilities with organizational security needs. Provide training, mentoring, and best practices for other Splunk users and administrators. Stay up to date with new features, apps, and updates to Splunk, and share knowledge with the team. Documentation and Standards: - Maintain comprehensive documentation for Splunk configurations, use cases, search queries, and data pipelines. Develop standard operating procedures (SOPs) for various Splunk-related tasks (e.g., creating reports, handling incidents, data ingestion). Document Splunk customizations, integration processes, and automation to ensure Sme, Aws, Integraions, Splunk Admin & Development, Splunk, Network Security, Splunk Admin, Restapi
Posted 1 month ago
8.0 - 10.0 years
10 - 12 Lacs
Gurugram
Work from Office
As a Product Security Architect (Software, Hardware/Firmware) , you will be responsible for ensuring the security, integrity, and confidentiality of the hardware, software systems and applications developed by Luminous. You will work closely with development teams, project managers, and other stakeholders to design, implement, and maintain robust security measures and best practices throughout the software development lifecycle. Your primary objective will be to identify potential security vulnerabilities, define security requirements, and implement effective solutions to safeguard sensitive data and protect against cyber threats. Qualification/ Personal Attributes Qualification Bachelors / Master s degree in Computer Science, Information Security or similar Experience 8-10 years of experience in software & firmware security (for Web application, Mobile App in IoT domain) Proven experience as a Software & firmware Security Architect or in a similar role. In-depth knowledge of software security principles, secure coding practices, Database security and common security vulnerabilities. Drafting polices related to product security. Expertise in Cloud Security Experience in DevSecOps Experience with security testing tools and methodologies, including static code analysis, dynamic analysis, and penetration testing. Strong understanding of authentication and authorization protocols (e.g., OAuth, SAML, JWT) and encryption techniques. Familiarity with compliance standards such as OWASP, ISO 27001, NIST, and PCI DSS. Proven experience as an IoT Security Architect or a similar role with a focus on IoT security. Solid understanding of IoT architectures, protocols, and technologies. In-depth knowledge of IoT security principles, secure design patterns, and common IoT vulnerabilities. Experience with IoT security frameworks and industry standards (e.g., IoT Security Foundation, IEC 62443, NIST SP 800-53). Familiarity with IoT device security features (e.g., hardware security modules, Trusted Platform Modules). Strong understanding of network security and encryption technologies Excellent communication and collaboration skills to work effectively with cross-functional teams. Relevant certifications such as CISSP, CSSLP, or CISM are a plus. Team handling experience (with Pen tester, Security analyst & DevSecOps engineer) Skills & Attributes Problem-solving skills with a sharp analytical mind Capability to collaborate with cross functional teams/3rd parties Understanding the business side of the application An ardent researcher of market trends and technology evaluation Job Description Responsibilities 1. Security Architecture Design: Develop and design the security architecture for software applications and systems, taking into consideration various factors like scalability, performance, and usability while ensuring robust security measures. Create and maintain security policies, standards, and guidelines for the development and deployment of software applications. 2. Threat Modeling and Risk Assessment: Perform threat modeling and risk assessments for software projects to identify potential security risks and vulnerabilities. Collaborate with cross-functional teams to prioritize and address security issues based on the severity of risks. 3. Secure Coding Practices: Advise development teams on secure coding practices and conduct code reviews to identify and rectify security flaws. Promote the adoption of security-related best practices and coding standards across the development teams. 4. Security Testing: Plan and oversee security testing activities, including penetration testing, vulnerability scanning, and code analysis. Plan and oversee security testing activities for IoT devices and applications, including penetration testing and vulnerability assessments. Analyze and interpret the results of security testing and work with the development teams to address identified issues. 5. Authentication and Authorization: Design and implement strong authentication and authorization mechanisms to control access to software applications and data. Integrate industry-standard authentication and authorization protocols into the software systems. 6. Encryption and Data Protection: Ensure the appropriate use of encryption techniques to protect sensitive data at rest and in transit. Implement data protection mechanisms to safeguard the confidentiality and integrity of data. 7. Incident Response and Security Monitoring: Collaborate with the incident response team to develop incident response plans and participate in security incident handling and investigations. Implement security monitoring solutions to detect and respond to security incidents proactively. 8. Compliance and Governance: Support compliance audits and assessments related to software security. Stay up-to-date with industry security trends, regulations, and best practices to ensure compliance with relevant security standards. 9. IoT Data Security: Establish data security and privacy measures for IoT data storage, transmission, and processing. Implement encryption and data access controls to safeguard sensitive data collected by IoT devices. 10. Network Security for IoT: Design and implement secure communication protocols for IoT networks, ensuring data confidentiality and integrity. Implement network segmentation and access controls to isolate and protect critical IoT components.
Posted 1 month ago
2.0 - 6.0 years
6 - 10 Lacs
Bengaluru
Work from Office
Band- B2/ B3, NP- 60dyas Location- PAN INDIA Note- Need SecOps and TPRM with ServiceNow Job Description: We are seeking a skilled ServiceNow Developer with experience in Security Operations (SecOps) and Third-Party Risk Management (TPRM) modules. The ideal candidate will be responsible for designing, developing, and implementing solutions on the ServiceNow platform to support security workflows and vendor risk processes. Key Responsibilities: Develop and customize ServiceNow SecOps (Vulnerability, Incident Response) and TPRM modules. Integrate ServiceNow with external security tools and third-party platforms. Configure workflows, forms, reports, and dashboards. Troubleshoot and optimize existing ServiceNow implementations. Collaborate with security, compliance, and risk teams to gather requirements. Requirements: Strong hands-on experience with ServiceNow SecOps and/or TPRM. Proficiency in JavaScript, Glide, REST APIs, and ServiceNow best practices. Experience with security tools like Qualys, Tenable, or Splunk (plus). ServiceNow certifications (Certified Implementation Specialist Security Operations or Risk and Compliance) preferred.
Posted 1 month ago
7.0 - 12.0 years
13 - 18 Lacs
Coimbatore
Work from Office
Design, implement, and optimize scalable and reliable DevOps processes for continuous integration, continuous deployment (CI/CD), and infrastructure as code (IaC). Lead the architecture and implementation of cloud-based infrastructure solutions, leveraging AWS, Azure, or GCP, depending on project requirements. Collaborate with software development teams to ensure smooth integration of development, testing, and production environments. Implement and manage tools for automation, monitoring, and alerting across development and production environments (e. g. , Jenkins, GitLab CI, Ansible, Terraform, Docker, Kubernetes). Oversee the management of version control, release pipelines, and deployment processes for a variety of applications. Design and implement infrastructure monitoring solutions, ensuring high availability and performance of systems. Foster a culture of continuous improvement and work closely with development and operations teams to enhance automation, testing, and release pipelines. Ensure security best practices are followe'd in the development and deployment pipeline (e. g. , secret management, vulnerability scanning). Lead efforts to address performance bottlenecks, scaling challenges, and infrastructure optimization. Mentor and guide junior engineers in the DevOps space. Required Skills: bachelors degree in computer science, Information Technology, or related field, or equivalent work experience. 7+ years of experience in DevOps, cloud infrastructure, and automation tools. Strong experience with cloud platforms (AWS, Azure, GCP) and their services (EC2, Lambda, S3, etc ). Expertise in containerization technologies (Docker, Kubernetes) and orchestration tools. Extensive experience with automation tools (Jenkins, Ansible, Chef, Puppet, Terraform). Familiarity with infrastructure as code (IaC) principles and practices. Proficient with scripting languages (Bash, Python, Go, etc ). Strong knowledge of version control systems (Git, SVN). Experience with monitoring and logging tools (Prometheus, Grafana, ELK stack, New Relic). Excellent troubleshooting skills, with the ability to quickly identify and resolve complex issues. Strong communication and leadership skills, with a proven ability to collaborate across multiple teams. Solid understanding of Agile and Scrum methodologies. Preferred. Qualifications: Certifications in DevOps tools, cloud technologies, or Kubernetes. Experience with serverless architecture. Familiarity with security best practices in a DevOps environment. Experience with database management and backup strategies.
Posted 1 month ago
5.0 - 10.0 years
30 - 37 Lacs
Bengaluru
Work from Office
As a Lead Security Engineer at JPMorgan Chase within the Cybersecurity & Tech Controls team, you are an integral part of team that works to deliver software solutions that satisfy pre-defined functional and user requirements with the added dimension of preventing misuse, circumvention, and malicious behavior. As a core technical contributor, you are responsible for carrying out critical technology solutions with tamper-proof, audit defensible methods across multiple technical areas within various business functions. Job responsibilities Executes creative security solutions, design, development, and technical troubleshooting with the ability to think beyond routine or conventional approaches to build solutions and break down technical problems Develops secure and high-quality production code and reviews and debugs code written by others Minimizes security vulnerabilities by following industry insights and governmental regulations to continuously evolve security protocols, including creating processes to determine the effectiveness of current controls Works with stakeholders and business leaders to understand security needs and recommend business modifications during periods of vulnerability Conducts discovery, vulnerability, penetration testing, and threat scenarios on multiple organizational assets to identify and assess if vulnerabilities are present, and executes threat modeling for multiple applications including external applications interacting with the internal JPMorgan Chase network Adds to team culture of diversity, equity, inclusion, and respect Required qualifications, capabilities, and skills Formal training or certification on security engineering concepts and 5+ years applied experience Skilled in planning, designing, and implementing enterprise level security solutions Hands on experience in Full stack Development with DotNet & React Proficient in all aspects of the Software Development Life Cycle Advanced understanding of agile methodologies such as CI/CD, Application Resiliency, and Security Experience with threat modeling, discovery, vulnerability, and penetration testing In-depth knowledge of the financial services industry and their IT systems Preferred qualifications, capabilities, and skills Experience effectively communicating with senior business leaders
Posted 1 month ago
4.0 - 8.0 years
11 - 15 Lacs
Mumbai
Work from Office
As Toku s Compliance and Privacy Officer, you'll lead privacy and security programs, ensuring adherence to regulatory standards like GDPR, SOC2, and ISO 27001. This pivotal role combines technical expertise and strategic project management to ensure regulatory adherence and data protection, shaping the future of compliance in the evolving crypto industry. What you'll do Oversee Privacy and Compliance Frameworks: Oversee GDPR compliance practices and drive certification efforts with TrustArc/eTrust, a leading privacy compliance governance certifier. Design and execute privacy and security programs and risk registers aligned with regulatory frameworks (eg, SOC2, GDPR, ISO 27001). Lead security and privacy program initiatives collaboratively across teams. Act as a point of contact for privacy-related inquiries and audits. Manage Security Protocols: Develop and implement security protocols to ensure data integrity and protection. Conduct system security audits and drive penetration testing. Define access control measures, encryption standards, and secure data transfer protocols. Technical Leadership: Lead vulnerability assessments and remediation strategies. Collaborate with engineering teams to integrate privacy-by-design and security-by-design principles. Develop Training Programs: Establish company-wide privacy and security training initiatives. Stay current with evolving regulations and security threats, adapting strategies accordingly. What we're looking for bachelors or masters degree. 4-8 years of experience driving security/privacy engineering, business practices, and programs in a fintech SaaS or HRIS/payroll platform. Proven track record managing GDPR, SOC2, or ISO 27001 implementations. Strong understanding of encryption, authentication, and network security. Familiarity with compliance management platforms like TrustArc or Drata. Excellent written and verbal communication skills with the ability to simplify complex ideas for diverse audiences. Certificates preferred Certified Information Systems Security Professional (CISSP). Certified Information Privacy Professional (CIPP/E, CIPP/US)ISO 27001. Lead Implementer certification. Why you'll love working at Toku Shape the future of the crypto compliance space during a pivotal regulatory moment. Work alongside innovative clients and highly engaged industry-leading investors. Join a fast-growing startup with a clear market need and a strong product-market fit. Competitive salary, equity, and remote-friendly work culture
Posted 1 month ago
4.0 - 8.0 years
11 - 15 Lacs
Chennai
Work from Office
As a Cybersecurity Cloud Specialist within the Renault Group IT Cybersecurity team, you will be a key reference for cybersecurity architectures, technical requirements, and solutions across cloud platforms such as GCP, AWS, and Azure. Your role involves assessing cloud platforms to ensure they meet cybersecurity requirements, utilizing Renault Groups tools and policies. This includes auditing existing cloud environments, identifying security gaps, and proposing improvements. You will be responsible for operating Cloud Security Posture Management tools, including Google Security Command Center and Checkpoint Cloud Guard, with the potential to integrate additional cybersecurity tools in the future. Staying updated on new threats, technologies, and opportunities is essential. In this role, you will act as a guide, helper, informer, trainer, and trouble-shooter, providing valuable support and expertise to the team. Key Responsibilities: Cloud Security Posture Management Tooling: Handle compliance alerts Identify relevant asset owners and contact them to mitigate issues Follow up with stakeholders Provide technical support for corrections Generate reports (KPIs, dashboards) Develop and maintain Python scripts Check configured cyber rules, monitor their effectiveness, and propose improvements Conduct regular reviews of cloud security rules and policies to ensure compliance with security standards and best practices. Perform technical risk assessments and vulnerability analysis on cloud policies and identified gaps. Develop and execute assessment plans to improve security standards and the security posture of cloud platforms. Bring expertise in micro-segmentation in cloud platforms (e.g., GKE clusters). Document and communicate processes and standards. Assist in the investigation and resolution of security incidents related to cloud platforms. Coordinate with corporate security and IT teams to implement corrective actions. Stay updated with the latest cloud technologies, security trends, and regulatory requirements. Provide recommendations to enhance security measures. Participate in security audits and assessments to ensure ongoing compliance and effectiveness. Knowledge, Skills, and Experience Requirements: Proficiency in cloud platforms and about cybersecurity practices on these platforms (priority #1 GCP, then AWS and Azure, potentially OCI). Strong understanding of network security principles and practices, micro-segmentation, hardening Knowledge of risk assessment and vulnerability analysis techniques. Familiarity with Google SCC (Security Command Center) and / or Checkpoint CloudGuard CSPM, or other CSPM like Wiz. Knowledge of scripting tools, like Python Excellent analytical, problem-solving, and communication skills. Ability to work independently and collaboratively in a team environment. May require on-call availability for critical security incidents. Ability to work under pressure and manage multiple tasks simultaneously. Qualifications, Certifications, and Education Requirements: Bachelor s degree in computer science, Information Technology, Cybersecurity, or a related field. SPECIFY INDUSTRY EXPERIENCE & KEY SKILL SET REQUIREMENT: 8+ years of experience in firewall management and security policy validation. Hands-on experience with major cloud platforms (priority #1 GCP, then AWS and Azure). Relevant cybersecurity and cloud cybersecurity certifications
Posted 1 month ago
1.0 - 4.0 years
3 - 6 Lacs
Bengaluru
Work from Office
Job Title: SOC Analyst Location: Bangalore (on site) Experience Level: 1 to 4 years The candidate must be willing to work in rotational shifts 24/7. About ColorTokens At ColorTokens , we empower businesses to stay operational and resilient in an increasingly complex cybersecurity landscape. Breaches happen but with our cutting-edge ColorTokens Xshield platform , companies can minimize the impact of breaches by preventing the lateral spread of ransomware and advanced malware. We enable organizations to continue operating while breaches are contained, ensuring critical assets remain protected. Our innovative platform provides unparalleled visibility into traffic patterns between workloads, OT/IoT/IoMT devices, and users, allowing businesses to enforce granular micro-perimeters, swiftly isolate key assets, and respond to breaches with agility. Recognized as a Leader in the Forrester Wave : Microsegmentation Solutions (Q3 2024) , ColorTokens safeguards global enterprises and delivers significant savings by preventing costly disruptions. Join us in transforming cybersecurity. Learn more at www.colortokens.com . Our culture We foster an environment that values customer focus, innovation, collaboration, mutual respect, and informed decision-making. We believe in alignment and empowerment so you can own and drive initiatives autonomously. Self-starters and highly motivated individuals will enjoy the rewarding experience of solving complex challenges that protect some of the world s impactful organizations - be it a children s hospital, or a city, or the defense department of an entire country. Company Overview: ColorTokens is a fast-growing cybersecurity product company that is redefining the way enterprises protect their digital assets. Our market-leading Xshield platform enables Zero Trust microsegmentation and real-time visibility into application traffic, ensuring robust protection against modern cyber threats. We are looking for passionate and driven individuals to join our mission in building cutting-edge security products. Job Description: Skills and Experience: 1 to 4 years of experience in Cyber Incident response and investigations. Correlate and analyze events using the Splunk/Log Rhythm/Qradar and stellar cyber SIEM tool to detect IT security incidents. Knowledge of network and endpoint security, threat intelligence, and vulnerabilities. Conduct analysis of log files, including forensic analysis of system resource access. Monitor multiple security technologies, such as SIEM, IDS/IPS, Firewalls, Switches, VPNs, networking, and other security threat data sources. Knowledge of sandbox and malware analysis. Knowledge of Cyber Kill Chain and MITRE ATT&CK frameworks functionality. Possible attack activities, such as scans, man in the middle, sniffing, DoS, DDoS, etc. and possible abnormal activities, such as worms, Trojans, viruses, etc. CCNA, CEH, CISSP, GCA, GCIA, GCIH, SANS certification would be preferable. High level of integrity, professionalism, and attention to detail Ability to communicate complex security issues to peers and management alike. A motivated, self-managed individual who can demonstrate above average analytical skills and work professionally with peers and customers even under pressure. Roles & Responsibilities: Investigate alerts, triage, deep dives, and come up with proper action items and remediation plans. Conduct investigation, containment, and other response activities with business stakeholders and groups. Compose incident analysis and find reports for management, including gap identification and recommendations for improvement. Recommend or develop new detection logic and tune existing sensors/security controls. Participate in security incident response through in-depth, technical (log, forensic, malware, packet) analysis. Provide oversight of security alert detection and analysis capabilities across multiple technologies to ensure that security incidents are identified in a timely manner. Escalate and support potential security incidents in line with appropriate processes. Support communications of potential security incidents via multiple channels. Participate in the response to potential security incidents by identifying and communicating relevant supplementary information. Identify and analyze new and emerging threats to determine impacts to G-P and provide guidelines and recommendations pertaining to opportunities to strengthen G-P security posture. Assist with information security due diligence requests as needed. Provide security recommendations to other team members, management, and business stakeholders for solutions, enhancements to existing systems, and new security tools to help mitigate security vulnerabilities and automate repeatable tasks. Conduct security reviews, perform vulnerability assessments, recommend remediation actions, and manage security policies and access controls to monitor, protect, and govern data and applications across private and cloud environments. Qualifications: Education: Bachelor s degree in information technology, Computer Science, Business, Engineering required, or equivalent experience. Certifications: Advanced certifications such as OSCP, GCIH, GSOC, or GCIA. Incident Response Experience: 1 to 4 years of experience in Cyber Incident response and investigations. Strong interpersonal skills with the ability to collaborate well with others. And, strong written, verbal and communication skills must be needed. Why Join Us? Work on a cutting-edge cybersecurity product in a fast-paced startup environment. Collaborate with a world-class team of engineers and security experts. Opportunity to learn, grow, and make a real impact from day one.
Posted 1 month ago
3.0 - 8.0 years
4 - 5 Lacs
Hyderabad
Work from Office
Hiring: Business Development Executive - Accelerate Growth Details : The Role We are seeking a skilled and experienced Azure/AWS DevOps Engineer to join our dynamic team. The ideal candidate will be responsible for deploying, automating, maintaining, troubleshooting, and improving the systems that keep our backend infrastructure running smoothly. The role requires a blend of cloud expertise, programming skills, and strong communication abilities to collaborate effectively with development teams and other stakeholders. Key Responsibilities: Design, deploy, and manage scalable, secure, and resilient infrastructure on Azure/AWS. Implement and manage continuous integration/continuous deployment (CI/CD) pipelines. Automate infrastructure provisioning and management using Infrastructure as Code (IaC) tools (e.g., Terraform, CloudFormation, ARM templates). Implement robust monitoring and logging solutions to ensure system availability and performance. Utilize Azure Monitor, AWS CloudWatch, or other monitoring tools to track system metrics and troubleshoot issues Optimize infrastructure for cost, performance, and security. Ensure cloud infrastructure adheres to industry best practices and compliance standards Implement and manage security policies, identity and access management (IAM), and data protection mechanisms. Conduct regular security audits and vulnerability assessments. Work closely with development teams to understand their needs and provide cloud-based solutions. Assist in the migration of applications to cloud environments. Provide technical support and guidance to team members on best practices and troubleshooting Required Qualifications: Proven experience as a DevOps Engineer with a focus on Azure or AWS Strong knowledge of cloud infrastructure, networking, and security principles Hands-on experience with CI/CD tools such as Jenkins, GitHub Actions, Azure DevOps, or AWS CodePipeline. Proficiency in scripting languages such as Python, Bash, or PowerShell. Experience with IaC tools such as Terraform, CloudFormation, or ARM templates Familiarity with containerization technologies (e.g., Docker, Kubernetes). Excellent problem-solving skills and attention to detail. What We Offer Youll have plenty of chances to learn and grow with access to online courses, global knowledge-sharing events, and opportunities to earn external certifications The freedom to shape your personal and professional development. A diverse and inclusive culture that supports both individuality and teamwork. Opportunity to share your idea Learning opportunities to help you acquire new skills or deepen existing expertise. Non-hierarchical structure that will enable you to work with senior managers and directly with clients. A diverse, inclusive, meritocratic cultures on international platforms Benefit package: Health benefits, Retirement benefits, Paid time off, Flexible benefits. Why Join Ahex This is the place where fresh ideas are not only welcomed but actively encouraged, allowing you to contribute to cutting-edge solutions that push boundaries and challenge the status quo. Here, your growth matters. Youll find a commitment to fostering your personal and professional development. Join a team that knows how to have fun! When we re not hacking, we re gathering around the table for authentic Hot Pot (yum!). Technology to do your job successfully: new computer and (practically) whatever else you need. Flexible and generous vacation policy, paid holidays off, including your birthday! Pre-tax commuter benefits. Work Life Balance : Your well-being matters. Flexible Work Policy. Apply for this position Allowed Type(s): .pdf, .doc, .docx By using this form you agree with the storage and handling of your data by this website. *
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough