Home
Jobs

465 Vulnerability Management Jobs - Page 16

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

9.0 - 14.0 years

8 - 12 Lacs

Hyderabad

Work from Office

Naukri logo

We re on a mission to change the future of clinical research. At Perceptive, we help the biopharmaceutical industry bring medical treatments to the market, faster. Our mission is to change the world but to do this, we need people like you. Apart from job satisfaction, we can offer you: HEALTH: - Medical plan for you and your dependents. - Personal Accident Insurance - Life Insurance - Critical illness cover WEALTH: - Salary structure and Flexi basket - Provident fund of 12% - Gratuity scheme YOURSELF: Internal growth and development programs trainings Key Responsibilities Security Engineering Implementation Deploy, configure, and maintain security technologies, including firewalls, IDS/IPS, endpoint security, and XDR solutions. Work closely with IT and DevOps teams to integrate security into system and application architectures. Threat Detection Incident Response Monitor security alerts and investigate incidents to identify root causes and remediation actions. Support security operations teams in responding to threats and improving detection and response capabilities. Endpoint, Cloud, and Network Security Implement and manage security controls for endpoints, cloud environments, and networks. Work on securing hybrid cloud infrastructures and enforcing Zero Trust principles Vulnerability Patch Management Conduct security assessments and penetration tests to identify vulnerabilities. Work with IT teams to prioritize and apply security patches and remediations. Compliance Risk Management Assist in maintaining compliance with industry regulations (ISO 27001, GDPR, HIPAA). Participate in security audits, risk assessments, and policy development to strengthen the organization s security framework. Security Awareness Collaboration Work closely with internal teams to provide security guidance and training. Contribute to security awareness programs to enhance the organizations security culture. Functional Competencies (Technical knowledge/Skills) Strong knowledge of security frameworks (NIST, ISO 27001, CIS Controls). Hands-on experience with security tools such as firewalls, IDS/IPS, EDR, and XDR solutions. Understanding of cloud security in AWS, Azure, or GCP. Experience with vulnerability management and penetration testing. Knowledge of IAM, PAM, and Zero Trust security principles. Strong analytical skills and problem-solving capabilities. Effective communication skills to work with technical and non-technical teams. Experience, Education, and Certifications 9+ years of experience in cybersecurity, with hands-on expertise in security engineering. Bachelors degree in Computer Science, Cybersecurity, or a related field. Relevant certifications such as CISSP, CEH, OSCP, or equivalent are preferred. Experience in security operations, incident response, and vulnerability management. Strong understanding of regulatory and compliance requirements in cybersecurity. Come as you are. Were proud to be a Equal Employment Opportunity employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.

Posted 1 month ago

Apply

9.0 - 14.0 years

10 - 20 Lacs

Nashik, Pune, Bengaluru

Work from Office

Naukri logo

Job Title: Threat Intelligence Analyst Corporate Title: AVP Location: Pune, India Role Description As a Threat Intelligence AVP in the Threat Intelligence and Assessment function, you will play a critical role in safeguarding the organization from cyber threats. In this role, you will be responsible for identifying, assessing, and mitigating threats, you will provide mitigation recommendations in response to evolving threats. You will be required to analyse complex technical issues and develop bank specific solutions while collaborating with diverse teams and stakeholders. This role will also consist of delivering against projects and strategic initiatives to continuously enhance the banks capabilities in responding to threats. What we’ll offer you As part of our flexible scheme, here are just some of the benefits that you’ll enjoy, Best in class leave policy. Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Pro-actively identify threats and track threat actors, TTPs, and ongoing campaigns to produce timely actionable intelligence. Produce threat assessments to support threat mitigation activities. Analyse multiple data/intelligence sources and sets to identify patterns of activity that could be attributed to threats and develop informed recommendations. Conduct analysis on files/binaries, packet captures, and supporting materials to extract relevant artifacts, observables, and IOCs. Proactively drive improvements of internal processes, procedures, and workflows. Participate in the testing and integration of new security monitoring tools. Meet strict deadlines to deliver high quality reports on threats, findings, and broader technical analysis. Take ownership for personal career development and management, seeking opportunities to develop personal capability and improve performance contribution. Develop and maintain relationships with internal stakeholders, external intelligence sharing communities. Your skills and experience Requirements 5+ years of experience in cybersecurity, with a focus on threat intelligence, analysis, and mitigation Strong operational background in intelligence related operations with experience in Open-Source Intelligence (OSINT) techniques Operational understanding of computing/networking (OSI Model or TCP/IP). Knowledge on the functions of security technologies such as IPS/IDS, Firewalls, EDR, etc A good or developing understanding of virtual environments and cloud (e.g., VSphere, Hypervisor, AWS, Azure, GCP) Demonstrated knowledge and keen interest in tracking prominent cyber threat actor groups, campaigns and TTPs in line with industry standards Knowledge of or demonstratable experience in working with intelligence lifecycle, intelligence requirements and Mitre ATT&CK Framework Non-Technical Experience Investigative and analytical problem solving skills Excellent verbal and written communication; to both technical and non-technical audiences. Self-motivated with ability to work with minimal supervision. Education and Certifications Preferred - Degree in computer science, networking, engineering, or other field associated with cyber, intelligence or analysis. Desired Experience or Certifications CISSP, CISM, GIAC, GCTI, GCIH, GCFE, GCFA, GREM, GNFA, Security+, CEH How we’ll support you Training and development to help you excel in your career. Coaching and support from experts in your team. A culture of continuous learning to aid progression. A range of flexible benefits that you can tailor to suit your needs. About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htmRole & responsibilities Preferred candidate profile

Posted 1 month ago

Apply

5.0 - 7.0 years

11 - 18 Lacs

Pune, Bengaluru, Mumbai (All Areas)

Hybrid

Naukri logo

Position Summary: Security operations team is responsible for ensure that the Confidentiality, Integrity, and availability of the organization is always protected. The person working in L2 SOC team operates the security monitoring solutions, reacting timely to security events as identified. In this role, individual is expected to manage and configure security tools, manage security incidents, implementing proactive security measures, identifying, and analyzing potential security threats and vulnerabilities. This role requires working in shift Job Functions and Responsibilities: Develop and enhance SIEM rules, use-cases, log source integration, log parsing, queries, dashboards, channels and custom rules. Provide support to configure, analyze, and remediate issues on the SIEM. Investigate suspicious activities, contain, and prevent them. Correlate and validate alerts. Analyze these events within the network environment of the business, and coordinate response activities with key staff in real time Monitor security alerts and events from various sources to identify potential threats and security incidents. Analyze security data and logs to detect unauthorized access, malware infections, and other suspicious activities. Lead or assist in responding to security incidents, coordinating efforts to contain and mitigate the impact. Implement, configure, and manage end point and network security solutions. Analysis of phishing emails reported by internal end users. Escalation of incidents to be handled to L3/ Leads, when relevant. Follow up on remediation activities Triage on general information security tickets. Stay current with emerging security threats, vulnerabilities, and attack techniques. Utilize threat intelligence sources to proactively identify potential risks. Bachelors degree from an accredited college / university with basic knowledge of Information Security. Familiarity with security technologies, including firewalls, EDR, antivirus , Email Security and Deception Keen to learn the security technologies and how security operates. Reliability and overall good communication skills. Well-developed logical thinking capabilities, to be able to investigate cases. Able to work in shift and weekend. Qualifications: 4-5 years of progressive experience in SIEM Implementation/Administration, Alert Monitoring and Incident Management. WORK SCHEDULE OR TRAVEL REQUIREMENTS 2 PM to 11 PM / 10 PM to 7 AM IST. No travel.

Posted 1 month ago

Apply

10.0 - 12.0 years

20 - 30 Lacs

Pune

Hybrid

Naukri logo

Exp : 10 to 12 yrs As a Product Manager for Policy Compliance, you will be responsible for translating customer use cases into actionable user stories and epics for developers. Collaborate with a cross functional team on solution architecture and feature design as well as drive engineering deliverables from conception to delivery. Work with Sr. Product Manager, solution architect(s) and other key stakeholders to ensure features delivered map to real world usage, translating customer feedback into new feature requests and feature refinements. Work directly with engineering management to ensure on time delivery of defined product features. Attend and drive engineering grooming sessions and regular scrum meetings to ensure proper PM input when needed for engineering priorities. Collaborate with Compliance PM team on prioritization of the product backlogs to develop and maintain roadmaps for internal and external stakeholders. Develop personas for each product and ensure those personas reflect each class of customer, stakeholder and internal resources that use the products Deliver product feature/solution demonstrations to customers Working closely with UX/ UI experts to create an intuitive and state of the art user interface Track product competition and ensure sales and marketing has the material needed to maximize sales efforts relative to competitors Desired Skills, Experience, and Qualifications: The candidate must possess a product management background with two years of proven product management experience in cybersecurity, cloud security, or IT compliance.. Experience in Secure Configuration management, Policy Compliance, Vulnerability management and other cybersecurity domain expertise is preferred Deep understanding of configuration management concepts, secure baselines, and operating system hardening practices. Strong familiarity with industry benchmarks ( CIS, DISA STIGs etc) and compliance frameworks (e.g., CIS, NIST, PCI-DSS, ISO 27001, DORA etc). Ability to define user stories, acceptance criteria, and prioritize feature backlogs using Agile methodologies. Advanced degree or certifications (e.g., CISSP, CISA, CISM) are a plus.. Excellent verbal and written communication skills with a proven ability to create enablement collateral (presentations, whitepapers, demos, etc)

Posted 1 month ago

Apply

8.0 - 10.0 years

9 - 13 Lacs

Pune

Work from Office

Naukri logo

Join our Team Grow with us About this opportunity: We are seeking a Security Specialist to join our team. The role involves identifying, researching, prioritizing, remediating, and mitigating vulnerabilities as part of our vulnerability management practice. Youll work with a diverse and skilled team to ensure the security of our information assets. What you will do: Align with units and stakeholders on PT test requirements and schedules. Conduct manual penetration testing with hands-on experience. Create scripts for payloads and simulate security breaches. Perform web, API, mobile, and infrastructure pen testing. Set up test labs for zero-day attacks and plan penetration methods. Execute periodic testing based on threat intelligence and data review. Report findings and suggest risk mitigation strategies. Present conclusions to stakeholders. Manage PT tools, licenses, and infrastructure. Drive automation and innovation for improved efficiency and quality. Document designs and configurations. Resolve reported vulnerabilities and propose solutions for gaps. Analyze critical exploits and mentor security engineers. Provide after-hours support for IT security incidents. The skills you bring: Bachelor s Degree in Computer Science or related field. 8-10 years of experience. Strong knowledge of security controls (e.g., access control, encryption, and application security). Proficiency with PT tools like Kali Linux, Metasploit, and Burp Suite. Deep understanding of security issues in enterprise, network, API, and mobile systems. Familiarity with enterprise computing, distributed applications, and TCP/IP network security. Experience in writing technical reports and summaries. Ability to provide after-hours support and work under pressure. Effective in both team and independent work settings. Participate in on-call rotation for critical incidents. Strong collaboration and knowledge-sharing skills. Results-driven with excellent communication skills; fluency in English is essential. Preferred certifications: OSCP, OSWP, OSEP, OWSA, OWSE. Why join Ericsson? What happens once you apply? Primary country and city: India (IN) || Gurgaon, Noida, Bangalore, Kolkata, Pune Req ID: 767059

Posted 1 month ago

Apply

1.0 - 3.0 years

5 - 9 Lacs

Mumbai

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT Mandatory Skills: Vulnerability Management.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Gurugram

Work from Office

Naukri logo

Role: SharePoint Architect Do: ESSENTIAL DUTIES/RESPONSIBILITIES : - Oversee help desk support to ensure that end user problems are resolved in a timely and effective manner, enabling users to access needed information and utilize technology resources effectively. - Improve productivity at ServiceDesk by focusing on reducing incidents, use self-heal and self-help techniques to reduce call flow at SD. - Communicate effectively with customers and stakeholders to assess support needs, assist in the identification of technology needs, and respond to customer service concerns. - Train and guide support specialists to effectively utilize help desk problem-management process (the identification, prioritization, escalation and resolution of end user help requests) to ensure quick and accurate responses to all end users, while emphasizing a customer-focused attitude. - Establish and monitor service level targets/benchmarks and measure performance against those benchmarks. Establish and monitor Compliance level across the region - Patch, AV and security standards - Track and analyze support calls and information requests to identify areas of need and create strategies to enhance end-user capacity and end-user reliance on support personnel. - Develop and maintain comprehensive documentation, includingoperations guidelines and procedures, inventory checklists, deployment guides, budget information, training guides and support materials. - Measure and report on unit performance via metrics and indicators of service level activity and customer satisfaction. Provide regular helpdesk performance and utilization reports to leadership. - Manage the inventory, support and maintenance of the region/location's end user technology assets, including, but not limited todesktop and notebook computers, mobile devices (smart phones, tablets, etc.), printers and software. - Facilitate equipment, services, and software purchases and implementation; and manage inventory and licensing reconciliations. Conduct research and make recommendations on hardware and software products, services, protocols, and standards. SECONDARY DUTIES/RESPONSIBILITIES: - Recommend changes or enhancements in available information technology or equipment as prompted by feedback via the user support function. - Engage in ongoing research of emerging trends and new technologies which may benefit the corporation's goal of strategically implementing technology to enhance business performance, and specifically support the support services function. - Participate in the planning, policy and decision making discussions involving information management projects. - Provide occasional technical support and best practice advice for offsite Corporation events. - Research and implement special projects and other duties as assigned. NATURE OF WORK CONTACTS - Works closely with staff and management from other units and divisions. - Regular interactions with GNOC such as network administrators and server admi. - Periodic correspondence and interaction with vendors Management staff Mandatory Skills: Technology (Alight IT). Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 13.0 years

3 - 7 Lacs

Pune, Bengaluru

Work from Office

Naukri logo

Job Title:DLP Lead Experience8-14 Years Location:Bangalore /Pune : Technical Skills: Experience in configuring s and creating workflows on Email DLP - Proofpoint Prior experience with CASB Netskope or similar solution Knowledge of security principles including cloud , standards and techniques Understanding of cloud principles ,cloud applications and key cloud service providers Prior experience with Data loss prevention tools, SIEM, network devices and other infrastructure Reviews violations of data security procedures to eliminate violations Strong experience on Mimecast email Security solution for threat Protection, Spoofing, Encryption, Archive, URL Defense Strong understanding of email delivery architecture, email gateway and DNS technologies Strong understanding of networking, SMTP, DNS Experience of compliance requirements for database security (e.g. SOX, HIPAA, PCI etc.) Strong verbal and written communications skills; must be able to effectively communicate technical details and thoughts in non-technical/general terminology to various levels of the organization. Work well in team environments with internal and external resources as well as work independently on tasks Strong organizational, and time management skills Process Skills: Overall management of Email DLP solution - Proofpoint Analyze blocked emails Manage CASB operations ,maintain implemented Netskope CASB solution,respond and resolve incidentsinvestigate and conduct analysis Work on email release/drop as per requests Tune/Amend email DLP policies Perform Daily DLP System Health check and publish health report Update/Add - roles modification, response rules, complex and new policies modifications Email DLP – Microsoft E4 licenses CASB –Netskope Behavioral Skills: Effective interpersonal, team building and communication skills Ability to collaborate; be able to communicate clearly and concisely both to laypeople and peers, be able to follow instructions, make a team stronger for your presence and not weaker. Ability to see the bigger picture and differing perspectives; to compromise, to balance competing priorities, and to prioritize the user. Desire for continuous improvement, of the worthy sort; always be learning and seeking improvement, avoid change aversion and excessive conservatism, equally avoid harmful perfectionism, 'not-invented-here' syndrome and damaging pursuit of the bleeding edge for its own sake. Learn things quickly, while working outside the area of expertise. Analyze a problem and realize exactly what all will be affected by even the smallest of change you make in your design Ability to communicate complex technology to no tech audience in simple and precise manner. Ownership skills. Qualification: Must have 4 Year degree (Computer Science, Information Systems or equivalent) 4+ years overall IT experience.

Posted 1 month ago

Apply

2.0 - 4.0 years

5 - 11 Lacs

Chennai, Coimbatore, Bengaluru

Work from Office

Naukri logo

Role & responsibilities Understand the security environment, identify security gaps in IT Infrastructure, report to Security and fix the gaps on priority Be the first line of defence against cyber threats, monitoring security systems, analysing alerts, investigating incidents, and responding to security events, while also contributing to improving the organization's security posture Respond to security incidents, including conducting forensic investigation and implementing remediation measures. Stay informed about the latest security threats, vulnerabilities and industry best practices. Proactively search for and identify potential threats and vulnerabilities that may have bypassed existing security controls. Evaluate and recommend security tools and technologies to enhance the organizations security posture. continually identify, assess, report on, manage and remediate vulnerabilities across endpoints, workloads and systems. Conduct ethical hacking activities (CEH) to identify vulnerabilities and weaknesses in systems and applications. Perform Vulnerability Assessment and Penetration testing (Pen Test) to simulate Cyber Attacks and assess the effectiveness of security measures. Maintain and tune information security monitoring tools and systems. Have strong understanding of networking protocols (ex: TCP/IP, DNS, DHCP) and OSI model to work with Network teams. Harden network devices (routers, switches) by applying security best practices and configuring ACLs to limit unauthorized access. Knowledge of cryptographic algorithms and protocols (AES, SSL/TLS, IPSec) for securing data in transit and at rest. Deep understanding of cryptographic principals, key generation, distribution, storage, and rotation along with the ability to develop and implement robust key management policies & procedures. Review Firewall rules, Routers, Switches, IDS, IPS, Servers, Databases and other infrastructure components to identify security gaps in their configuration. Preferred candidate profile B.Tech/M.Sc with computer science or information technology with good communication skills Overall IT experience of 4 to 8 years, with a minimum of 3 to 5 years in IT Security, IT Audit. Strong understanding of Network protocols, VPN, Remote connectivity, Firewall technologies and intrusion detection or prevention systems. Experience in handling SIEM tools, performing VAPT exercises, patch management, AV updates, and security configuration of systems Certifications like CompTIA Security+, or CISSP or CEH or Any One Security Certification (C- Level) Certification is Must Note : Candidate having less than 30 days' notice period or immediate joiners alone please apply Interested Candidates please share the profile to my Email ID - Krishnaprasad.ravishankar@omegahms.com

Posted 1 month ago

Apply

8.0 - 12.0 years

18 - 27 Lacs

Pune

Work from Office

Naukri logo

The Vulnerability Management Engineer II is responsible for managing the identification, assessment, reporting, and mitigation of infrastructure and cloud vulnerabilities. A candidate for this role will have a mindset of a defender and be able to operate in a fast-paced environment working closely with our infrastructure team that includes Network, Firewall, Hypervisors, Servers, and business application teams. Key Responsibilities: • Serve in a contributing role that requires frequent interaction with IT and Infosec managers, engineers and developers. • Provide vulnerability remediation governance and operational support. • Perform vulnerability metrics reporting for ad-hoc and scheduled metrics report for various KPIs (Key Performance Indicators) around vulnerability management activities. • Drive and track remediation initiatives across multiple support teams. • Respond to questions from stakeholders about remediation and vulnerability assessment results and actions. • Collaborate with support groups/stakeholders on details about identified vulnerabilities. EXPERIENCE AND EDUCATIONAL REQUIREMENTS: • Bachelors degree in Computer Science, Cybersecurity or other related field, or equivalent work experience. • Proficient in various vulnerability assessment tools such as Qualys, Armis, Microsoft Defender for Endpoint/Cloud. • Ability to analyze vulnerability metrics using Microsoft Excel advanced techniques. • 5-8years of combined IT and security work experience with a broad range of exposure to cybersecurity, systems analysis, application development and/or systems administration and 3+ years of vulnerability management experience. • Requires Security Certification(s) (i.e., Certified Information Systems Security Professional (CISSP), or Certified Information Security Manage (CISM), Certificate of Cloud Security Knowledge (CCSK), Offensive Security Certified Professional (OSCP) or other equivalent recognized security certifications. • Good understanding of industry standard regulations and risk management frameworks and standards (e.g., ISO, PCI, NIST, COBIT, GAPP, HIPAA, GDPR). • Familiarity with SANS Top 25 controls, OWASP Top 10 and/or MITRE ATT&CK framework • Excellent communication skills: able to explain complex concepts clearly to both technical and non-technical stakeholders. Skills Desired: • Exposure or knowledge of cloud architectures, services, and vulnerabilities. • Understanding of risk assessment methodologies. • Proficiency in using vulnerability scanning tools such as Qualys, Armis, MS Defender, etc. • Ability to interpret vulnerability data from multiple sources. • Reporting and metrics expertise with platforms such as ServiceNow (SecOps), PowerBI, etc.

Posted 1 month ago

Apply

6.0 - 10.0 years

15 - 25 Lacs

Bengaluru

Work from Office

Naukri logo

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you passionate about cybersecurity and looking for an exciting role where you can make a difference? If so, we have an opportunity for you! As a Security Specialist at Kyndryl, you will play a crucial role in enabling and securing our customer organizations, cultures, and ecosystems. Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. You will be tasked with configuring, monitoring, and managing the performance of networks to maintain the quality of services, while also protecting organizational infrastructure from malicious cyber-attacks. As a key member of our team, you will assess, predict, prevent, and manage the risk of IT infrastructure and data, helping our customers stay ahead of the curve and ensure their systems are secure. You will develop and implement security policies and procedures, working closely with other departments to ensure that all security measures are in place and operating effectively. But that is not all – at Kyndryl you will have the opportunity to explore innovation in CyberSecurity data science – taking information that has been gathered and looking for areas to have that “Ah Ha” moment. Drawing conclusions and patterns from the data across single and multiple clients. Creating new ideas in the area of risk management and risk quantification. In addition to your technical responsibilities, you will also play a key role in raising awareness of potential security threats through technical security training on best practices. This is an exciting opportunity to help shape the culture of our clients' organizations and make a tangible impact on their security posture. If you have a passion for cybersecurity – governance, risk and compliance, are looking for a challenging and dynamic role, and want to work with a team of like-minded individuals, then we want to hear from you! Join us as a Security Specialist and help us secure the future of our clients' organizations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Experience: 3 to 6 years of experience in IT security with a strong understanding of information security principles and best practices. Expertise in application security, vulnerability management, cloud security ( AWS, Azure) and threat modeling. Risk Management & Compliance (NIST, GDPR, PCI DSS) Experience with programming languages and technologies, including Java, APIs, ASP.Net, Spark, Python, and React.js. Strong ability to conduct independent application security assessments (ASA, API Security), security control assessments, and risk reviews. Hands-on experience in security processes within the Software Development Lifecycle ( Secure by Design in SDLC ). Knowledge of security tools, customer/business interaction, and strong communication & stakeholder management skills required Ability to analyze security architectures and provide relevant security policies and recommendations. In-depth knowledge of regulatory compliance frameworks such as GDPR, NYDFS, SCHREMS, DORA, ECB Audit, NIST, and SECAIA. Proficiency in cloud and network security, identity and access management (IAM), data encryption, and SIEM tools. Exposure to security tools like Qualys, Nessus, Nmap, Burp Suite, SonarQube, Netsparker, OWASP, and open-source security testing tools. Experience in planning and executing security action plans while maintaining security documentation as per organizational guidelines. Ability to drive Secure by Design principles throughout the SDLC and train teams on the latest security technologies. Excellent problem-solving skills, adaptability, and interpersonal skills to collaborate with cross-functional teams. Preferred Technical and Professional Experience: Proven track record in implementing security solutions and compliance projects for banking service platforms and applications. Hands-on experience in DevSecOps, API security, and secure software development practices. Strong knowledge of infrastructure security, including firewalls, routers, and Wi-Fi security. Experience with security automation, penetration testing, and risk acceptance management. Ability to train and mentor teams on secure coding practices and emerging security technologies. Strong communication and influencing skills, with the ability to engage effectively with business stakeholders and technical teams. Demonstrated ability to prepare security reports and maintain clear, structured communication with project stakeholders Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 1 month ago

Apply

1.0 - 4.0 years

5 - 7 Lacs

Pune

Work from Office

Naukri logo

Network Security Operations: Ensure the stability and security of customer networks with minimal downtime through expert management of Huawei firewall devices. Firewall Configuration & Policy Management: Implement, manage, and troubleshoot firewall policy rules, NAT rules, and routing configurations based on customer requests submitted via ServiceNow (SNOW). System Maintenance & Upgrades: Perform regular firmware upgrades on security appliances based on vendor (OEM PSIRT) recommendations to mitigate vulnerabilities and fix bugs. Implementation & Project Delivery: Plan, implement, provision, and thoroughly test new security solutions and configurations to meet evolving customer business requirements. VPN Management: Design, configure, and troubleshoot IPSEC VPN tunnels, ensuring secure connectivity using appropriate encryption and integrity protocols. Troubleshooting & Vendor Escalation: Systematically diagnose and resolve network security incidents; escalate complex issues (Level 3) to vendors and coordinate effectively to resolve hardware or software problems. Vulnerability Management & Remediation: Collaborate with the security team to perform vulnerability and fault analysis on enterprise perimeter devices; develop and execute remediation and recovery plans. Auditing & Compliance: Conduct regular firewall audits and implement changes while strictly adhering to established audit, compliance processes, and documentation standards. Proactive Monitoring & Improvement: Anticipate potential issues or situations that could impact service quality and network performance, recommending and implementing preventative measures. Team Collaboration & Communication: Work effectively within the security team and across functional departments; handle client escalations professionally and maintain clear communication with all relevant parties during troubleshooting. Exp.- Minimum of 1+ years in security roles. Education- BE degree is a must

Posted 1 month ago

Apply

8.0 - 12.0 years

19 - 21 Lacs

Bengaluru

Work from Office

Naukri logo

Responsibilities: * Design, implement, and maintain secure solutions on AWS cloud platform using IAM and security architecture principles.

Posted 1 month ago

Apply

4.0 - 9.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Diverse Lynx is looking for Splunk Professional to join our dynamic team and embark on a rewarding career journey Collaborate with stakeholders to understand data requirements, use cases, and objectives for Splunk deployments Design and implement data ingestion processes, including data collection, parsing, normalization, and indexing in Splunk Develop custom Splunk queries, search strings, and data models to extract meaningful insights from machine-generated data Create interactive dashboards, reports, and visualizations using Splunk's search processing language (SPL) and visualization tools Implement and maintain Splunk apps, add-ons, and configurations to support specific use cases or data sources Automate data analysis workflows and alerting mechanisms to identify and respond to critical events and anomalies Optimize Splunk deployments for performance, scalability, and search efficiency Monitor and troubleshoot Splunk infrastructure and resolve issues related to data ingestion, search performance, and system availability Collaborate with security and operations teams to develop and implement Splunk-based security monitoring, log analysis, and incident response solutions Ensure data privacy and security by implementing access controls, data encryption, and compliance with relevant regulations Stay updated with Splunk product releases, new features, and best practices to recommend and implement improvements in Splunk deployments Provide training and support to end-users on utilizing Splunk for data analysis and visualization

Posted 1 month ago

Apply

5.0 - 10.0 years

15 - 30 Lacs

Bengaluru

Work from Office

Naukri logo

Site Reliability Engineer Experience: 2 - 12 Years Exp Salary : Competitive Preferred Notice Period : Within 30 Days Shift : 10:00AM to 7:00PM IST Opportunity Type: Onsite (Bengaluru) Placement Type: Permanent (*Note: This is a requirement for one of Uplers' Clients) Must have skills required : Python, Python /Golang, AWS, Kubernates, Docker /Kubernetes, Security & Vulnerability Practo (One of Uplers' Clients) is Looking for: Site Reliability Engineer who is passionate about their work, eager to learn and grow, and who is committed to delivering exceptional results. If you are a team player, with a positive attitude and a desire to make a difference, then we want to hear from you. Role Overview Description At Practo, we are on a mission to simplify healthcare and ensure that every individual has access to quality care. As a leading digital healthcare platform, we connect millions of patients with healthcare providers, making healthcare services more accessible and efficient. Join our dynamic team and contribute to transforming the future of healthcare. Job Overview: Practo is looking for a skilled Site Reliability Engineer (SRE) to join our team. The SRE will play a critical role in maintaining the reliability, performance, and scalability of our services. This role involves working with cloud platforms such as AWS, Azure, and Oracle, managing Ubuntu-based systems, and ensuring seamless operation of our infrastructure. The ideal candidate will have a strong background in system administration, cloud technologies, and modern DevOps practices. Key Responsibilities: Design, implement, and manage scalable, resilient, and secure infrastructure on cloud providers such as AWS, Azure, and Oracle. Oversee the administration of Ubuntu servers, ensuring optimal performance and uptime. Implement monitoring and alerting systems to proactively identify and resolve issues before they impact users. Automate repetitive tasks to improve system reliability and operational efficiency. Deploy and manage containerized applications using Docker. Utilize Kubernetes for container orchestration, ensuring efficient and reliable application deployment and scaling. Analyze system performance metrics and optimize infrastructure to meet performance targets. Troubleshoot and resolve issues related to server performance, network latency, and other system bottlenecks. Work closely with development teams to ensure new applications and features are designed with reliability and scalability in mind. Provide guidance and mentorship to junior engineers on best practices for system reliability and cloud management. Participate in on-call rotations to provide 24/7 support for critical issues. Implement security best practices across all infrastructure components, including firewalls, VPNs, and access controls. Ensure compliance with industry standards and internal policies for data protection and privacy. Technical Skills: Proven experience with cloud providers: AWS, Azure, and Oracle. Strong proficiency in managing and troubleshooting Ubuntu operating systems. Hands-on experience with Nginx, Kubernetes, and Docker. Familiarity with scripting languages (e.g., Bash) for automation tasks. Experience with CI/CD pipelines and tools like Jenkins, GitLab CI, or equivalent. Knowledge of networking fundamentals and security best practices. Experienced in using Python Professional Experience: 2+ years of experience in a Site Reliability Engineer or similar role. Excellent problem-solving skills and attention to detail. Strong communication skills, with the ability to collaborate effectively with cross-functional teams. Self-motivated with the ability to work independently and as part of a team. How to apply for this opportunity: Easy 3-Step Process: 1. Click On Apply! And Register or log in on our portal 2. Upload updated Resume & Complete the Screening Form 3. Increase your chances to get shortlisted & meet the client for the Interview! About Our Client: As India's leading integrated healthcare company, Practo has been on a mission to make quality healthcare accessible and affordable to all by connecting the entire healthcare ecosystem including patients, doctors, clinics, hospitals, pharmacies, and diagnostics in a seamless and cohesive manner. About Uplers: Our goal is to make hiring and getting hired reliable, simple, and fast. Our role will be to help all our talents find and apply for relevant product and engineering job opportunities and progress in their career. (Note: There are many more opportunities apart from this on the portal.) So, if you are ready for a new challenge, a great work environment, and an opportunity to take your career to the next level, don't hesitate to apply today. We are waiting for you!

Posted 1 month ago

Apply

2.0 - 5.0 years

2 - 5 Lacs

Bengaluru

Work from Office

Naukri logo

Varonis is looking for Security Analyst to join our dynamic team and embark on a rewarding career journey. Defining, planning, implementing, maintaining, and upgrading security measures, policies, and controls Assisting with the creation of updates and training programs to secure the network and train the employees Keeping the security systems up to date Monitoring security access and maintaining the relevant data Conducting vulnerability testing and risk analyses to assess security and performing internal and external security audits Analyzing security breaches to identify the cause and to update incidence responses and disaster recovery plans

Posted 1 month ago

Apply

4.0 - 9.0 years

3 - 7 Lacs

Patancheru

Work from Office

Naukri logo

Security engineer Protect our users and their data. 4+ years in security engineering. Encryption expertise. Threat modeling experience.

Posted 1 month ago

Apply

2.0 - 5.0 years

5 - 9 Lacs

Pune

Work from Office

Naukri logo

Position : Sr. Analyst - Vulnerability Management AQUA container Location : Pune Principal Responsibilities/Requirements: 2-5 yrs of Working experience in Vulnerability Management 2-5 yrs of Working experience in AQUA container vulnerabilities (AKS, PCF, Kubernetes) Identify and assess security vulnerabilities and coordinate with Line of business for remediations Execute day-to-day operations related to VM ensuring the correct assignments of vulnerabilities, acceptance of vulnerabilities, notifications to line of business on upcoming overdue vulnerabilities etc. Handling tickets assigned to VM team and timely resolution of it. Actively participate in meetings to understand business plans on remediations or roadblocks Respond to email advisories as well as chat/call to resolve queries/issues Partner and successfully build relationships with key stakeholders across NT Ensure to maintain KPIs under control on monthly basis. Seasoned multi-disciplinary expert with sound technical knowledge on VM process Should be able to navigate scanning tools, PowerBI & ServiceNow Skill / Experience Minimum: Working knowledge of information security scanning technologies & vulnerability management Strong analytical and problem-solving skills Experience with report visualization (Excel, ServiceNow, PowerPoint, Tableau, Power BI, etc.) Strong drive to provide excellent customer service and experience with an awareness of prioritization of tasks, stakeholders, budget, and time Excellent communication skills, both verbal and written Ability to work autonomously, under pressure, and to prioritize tasks Preferred : 2-5 years of relevant experience Any infosec certifications or related (desired, not a compulsion)

Posted 1 month ago

Apply

1.0 - 2.0 years

2 - 6 Lacs

Pune

Work from Office

Naukri logo

Position: Analyst - Vulnerability Management, Qualys VMDR AND/OR Wiz Location: Pune Principal Responsibilities/Requirements: 1-2 yrs of Working experience in Vulnerability Management 1-2 yrs of Working experience in Qualys VMDR AND/OR Wiz/Aqua Execute day-to-day operations related to VM ensuring the correct assignments of vulnerabilities, acceptance of vulnerabilities, notifications to line of business on upcoming overdue vulnerabilities etc. Handling tickets assigned to VM team and timely resolution of it. Actively participate in meetings to understand business plans on remediations or roadblocks Respond to email advisories as well as chat/call to resolve queries/issues Partner and successfully build relationships with key stakeholders across NT Ensure to maintain KPIs under control on monthly basis. Seasoned multi-disciplinary expert with sound technical knowledge on VM process Should be able to navigate scanning tools, PowerBI & ServiceNow Skill / Experience Minimum: Working knowledge of information security scanning technologies & vulnerability management Strong analytical and problem-solving skills Experience with report visualization (Excel, ServiceNow, PowerPoint, Tableau, Power BI, etc.) Strong drive to provide excellent customer service and experience with an awareness of prioritization of tasks, stakeholders, budget, and time Excellent communication skills, both verbal and written Ability to work autonomously, under pressure, and to prioritize tasks Preferred : 1-2 years of relevant experience Any infosec certifications or related (desired, not a compulsion)

Posted 1 month ago

Apply

2.0 - 6.0 years

4 - 8 Lacs

Mumbai

Work from Office

Naukri logo

WTW GLOBAL DELIVERY AND SOLUTIONS INDIA PVT LTD. is looking for Vulnerability Management Analyst to join our dynamic team and embark on a rewarding career journey. Identify and assess security vulnerabilities in the systems and applications. Develop and implement vulnerability management strategies and procedures, including vulnerability scanning, testing, and remediation. Ensure compliance with applicable laws, regulations, and industry standards related to vulnerability management. Work with other IT professionals to prioritize and address identified vulnerabilities, including collaborating on patch management activities. Develop and maintain vulnerability management reports and metrics to measure the effectiveness of vulnerability management activities and communicate with stakeholders. Participate in incident response activities related to security incidents and vulnerabilities, as necessary. Provide training and education to other IT professionals and stakeholders on vulnerability management principles and practices. Participate in risk assessment and management activities to identify and mitigate potential security risks. Excellent communication and interpersonal skills.

Posted 1 month ago

Apply

10.0 - 12.0 years

35 - 40 Lacs

Hyderabad, Chennai

Work from Office

Naukri logo

* Employee Experience Technology team provides technology solutions to support the Audit & Legal Technologies. Chief Administrative Office, Internal Technology and Global Human Resources. CACR Technology deliver applications and tools to support Corporate Audit functions. Job Description* We are seeking a Feature Lead to lead the architecture, design, and development of modern distributed applications. The role requires both hands-on coding and collaboration with stakeholders to drive strategic design decisions. The ideal candidate has a proven track record in developing and deploying Java, Spring Boot, Micro-Services, Angular applications combined with strong expertise in distributed systems. Responsibilities* Lead the architecture and design for building scalable, resilient, and secure distributed applications ensuring compliance with organizational technology guidelines, security standards, and industry best practices like 12-factor principles and well-architected framework guidelines. Actively contribute to hands-on coding, building core components, APIs and microservices while ensuring high code quality, maintainability, and performance. Ensure adherence to engineering excellence standards and compliance with key organizational metrics such as code quality, test coverage and defect rates. Integrate secure development practices, including data encryption, secure authentication, and vulnerability management into the application lifecycle. Work on adopting and aligning development practices with CI/CD best practices to enable efficient build and deployment of the application on the target platforms like VMs and/or Container orchestration platforms like Kubernetes, OpenShift etc. Collaborate with stakeholders to align technical solutions business requirements, driving informed decision-making and effective communication across teams. Mentor team members, advocate best practices, and promote a culture if continuous improvement and innovation in engineering processes. Requirements* Education* Graduation / Post Graduation: BE/B.Tech/MCA Certifications If Any: NA Experience Range* 10 to 12 Years Foundational Skills* 10+ years of work experience in full-stack software development with at least 5 - 6 years of strong experience in architecture, design, and development of modern distributed cloud native applications. Strong hands-on expertise in programming languages such Java and experience in technologies/frameworks such as Spring Framework, Spring Boot, Spring Micro Services, Angular. Deep knowledge of microservices. modular applications, REST APIs, messaging systems [Kafka, MQ], Redis and SQL database technologies on Oracle Strong knowledge in DevOps practices, CI/CD technologies, container technologies and platforms like Docker, Kubernetes/OpenShift. Deep knowledge and well-versed in industry best practices including SOLID principles, 12-factor standards, well-architected framework guidelines and secure development standards such as OWASP standards. Strong knowledge in cloud platform technologies and good to have experience in at least one major cloud platform like Azure, AWS or GCP. Desired Skills* Experience in developing Single page UI Application using any UI Technologies (Angular/React). Effective communication, Strong stakeholder engagement skills, Proven ability in leading and mentoring a team of software engineers in a dynamic environment. Work Timings* 11:30 AM to 8:30 PM IST Job Location* Chennai /Hyderabad

Posted 1 month ago

Apply

1.0 - 3.0 years

0 - 3 Lacs

Gurgaon/Gurugram

Work from Office

Naukri logo

What you'll do We are seeking candidates with 1 to 3 years of experience in information security to join our team. The ideal candidate will have a solid understanding of the Microsoft Office environment and a keen interest in pursuing a career in information security. Key Responsibilities: -Assist in monitoring and maintaining security systems and tools. -Support the implementation of security measures to protect sensitive data and systems. -Conduct regular security audits and assessments. -Help in identifying and mitigating potential security threats. -Collaborate with team members to develop and enhance security policies and procedures. -Stay updated with the latest trends and advancements in information security. Qualifications: -Bachelor's degree in Information Technology, Computer Science, or a related field. -Up to 1-3 years of experience in information security . -Proficiency in Microsoft Office tools (Word, Excel, PowerPoint, Outlook). -Strong analytical and problem-solving skills. -Excellent communication and teamwork abilities. -Basic understanding of cybersecurity principles and practices. Location: This position is based in our office in Gurugram, Haryana.

Posted 1 month ago

Apply

4.0 - 9.0 years

2 - 5 Lacs

Mumbai, Mumbai Suburban, Thane

Work from Office

Naukri logo

Hiring for IT MNC Company Vulnerability assessment on ISEC servers, VA report generation, dashboard publishing with daily updates, follow-up with respective stakeholders for closure of open points and update the same to ISEC ISG team Required Candidate profile Experience: 4 +Years Location: Ghansoli/Turbhe Notice Period: 30 Days snehapawar@peshr.com/7021769496

Posted 1 month ago

Apply

3 - 8 years

5 - 10 Lacs

Gurugram

Work from Office

Naukri logo

Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Endpoint Protection Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Job Summary :We are seeking a skilled Beyond Trust Endpoint Privilege Management (EPM) Specialist to join our IT security team. The ideal candidate will be responsible for implementing, managing, and optimizing Beyond Trust EPM solutions on Windows 10 and Windows 11 environments. This role focuses on enhancing security by managing and controlling administrative privileges on endpoints, reducing attack surfaces, and ensuring compliance with security policies.Key Responsibilities: Implementation and Configuration:oDeploy and configure Beyond Trust EPM solutions on Windows 10 and Windows 11 systems.oCustomize EPM policies to meet organizational security requirements and best practices.oIntegrate Beyond Trust EPM with existing IT infrastructure and security tools. Privilege Management:oDevelop and enforce policies for least privilege access on endpoints.oMonitor and manage user and application privileges to prevent unauthorized access.oCreate and maintain whitelists and blacklists for applications and processes. Security and Compliance:oEnsure endpoint security compliance with organizational policies and regulatory requirements.oConduct regular audits of privileged access and generate compliance reports.oCollaborate with security and compliance teams to address findings and improve security posture. Monitoring and Reporting:oSet up and maintain monitoring and alerting systems for privileged access activities.oAnalyze and respond to security incidents related to privileged access.oGenerate regular reports on EPM activities, incidents, and compliance status. User Training and Support:oProvide training and support to end-users and IT staff on EPM policies and procedures.oAssist in troubleshooting and resolving issues related to EPM solutions.oDevelop and update documentation and training materials. Continuous Improvement:oStay up to date with the latest security threats, trends, and technologies.oRecommend and implement improvements to EPM policies and configurations.oParticipate in security assessments and risk management activities. Qualifications: Education:oBachelor's degree in information technology, Computer Science, Cybersecurity, or related field. Relevant certifications and experience may be considered in lieu of a degree. Experience:oProven experience in implementing and managing Beyond Trust EPM solutions.oStrong knowledge of Windows 10 and Windows 11 operating systems.oExperience with endpoint security and privilege management. Skills and Competencies:oDeep understanding of least privilege access principles and practices.oProficiency in configuring and managing EPM policies and rules.oFamiliarity with Active Directory, Group Policy, and other endpoint management tools.oExcellent troubleshooting and problem-solving skills.oStrong communication and interpersonal skills.oAbility to work independently and as part of a team. Certifications:oRelevant certifications such as Beyond Trust Certified Engineer (BTCE), Certified Information Qualifications 15 years full time education

Posted 1 month ago

Apply

7 - 12 years

9 - 14 Lacs

Coimbatore

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Architecture Design Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will be responsible for defining the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will document the implementation of the cloud security controls and transition to cloud security-managed operations. Your typical day will involve designing and implementing security solutions, collaborating with cross-functional teams, and ensuring the integrity and confidentiality of data. Roles & Responsibilities: Expected to be an SME, collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Design and implement security solutions to protect the organization's cloud infrastructure. Collaborate with cross-functional teams to ensure the integrity and confidentiality of data. Conduct risk assessments and develop strategies to mitigate security risks. Stay up-to-date with the latest security trends and technologies. Ensure compliance with industry standards and regulations. Train and educate employees on security best practices. Professional & Technical Skills: Must To Have Skills:Proficiency in Security Architecture Design. Strong understanding of cloud security principles and best practices. Experience with cloud security technologies and tools. Knowledge of network security protocols and technologies. Familiarity with security frameworks and standards such as ISO 27001 and NIST. Good To Have Skills:Experience with cloud platforms such as AWS or Azure. Experience with security incident response and management. Knowledge of threat intelligence and vulnerability management. Understanding of identity and access management concepts. Solid grasp of encryption and cryptographic techniques. Additional Information: The candidate should have a minimum of 7.5 years of experience in Security Architecture Design. This position is based at our Mumbai office. A 15 years full time education is required. Qualifications 15 years full time education

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies