Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
12.0 - 15.0 years
40 - 45 Lacs
Mumbai
Work from Office
As a principal engineer of HERE IAM team, you ll be responsible for leadership, development and testing of scalable, robust, high throughput and low latency driven Authentication & Authorization services. You will have an opportunity to have noticeable impact on the performance of a critical component of the platform Some detailed responsibilities include the following: Working with our customers and leaders across the company to understand the business direction. Providing technical leadership to high performance teams and foster innovation. Developing key features for Identity & Access Management product initiatives Building technical architecture between multiple complex systems Documenting designs and architecture and review with stakeholders Driving continuous improvements with the teams processes Proactively identifying and resolving technical risks and issues that may impair the teams ability to deliver Who are you? You are a go-getter, with an eye for detail, strong problem-solving and debugging skills. You carry a Bachelors/Master s in computer science or related fields and have 12+ years of software development experience which includes: Solid experience in Scala/Java, Python development, and understanding of Microservices Architecture. Experience with Amazon Web Services, Splunk, Kubernetes, NGNIX Strong knowledge of algorithms & data structures Solid and proven problem-solving skills in system design and troubleshooting. Passion for cloud technologies Proven track record of having designed and deployed large scale & low latency cloud-based systems Familiarity with HTTP, the REST-principles, and TCP/IP networking, good understanding of OAuth and other authentication and authorization standards An opportunity to work with exceptional people Meaningful problems to solve A job that makes a difference in the world Freedom to decide how to perform your job Variety in the types of projects Feedback so you will know how well you are doing Collaborative, Supportive Colleagues in an inclusive environment
Posted 1 month ago
15.0 - 18.0 years
45 - 50 Lacs
Pune
Work from Office
Some careers shine brighter than others. If you re looking for a career that will help you stand out, join HSBC and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. HSBC is one of the largest banking and financial services organisations in the world, with operations in 64 countries and territories. We aim to be where the growth is, enabling businesses to thrive and economies to prosper, and, ultimately, helping people to fulfil their hopes and realise their ambitions. We are currently seeking an experienced professional to join our team in the role of Associate Director, Software Engineering In this role, you will: Work as Full Stack Engineering Lead within SaaP SVS. To produce technical designs and build features as per SaaP VS backlog Be responsible for Engineering governance process To interact with product vendors for future roadmap and enhancements Requirements To be successful in this role, you should meet the following requirements: Very Strong and hands-on experience in Java, Spring and Springboot. Experience in containerised technologies - Docker and Kubernetes . Experience to deploy and manage applications in AWS. Experience in API development including API governance. Experience of ForgeRock (Ping Identity) OpenAM /openIDM on Authentication tree, chains, Federation (SAML2), OpenID Connect (OIDC)/OAuth2, Multifactor Authentication or any other Access management tool like Okta, Sailpoint will be added advantage. Technical certification in AWS or CKAD. Additional knowledge or experience in any front end technology web (Angular) or mobile (swift or Kotlin) will be added advantage. Strong automation focus. Experience in agile ways of working. Good problem-solving and trouble shooting skills. Excellent communication and stakeholder management skills. Personal data held by the Bank relating to employment applications will be used in accordance with our Privacy Statement, which is available on our website.
Posted 1 month ago
2.0 - 7.0 years
3 - 6 Lacs
Hyderabad
Work from Office
About the role: The global Identity Access Management team is passionately serving our stakeholders while evolving best practices. As an Identity Access Engineer , you have a pivotal operational role to provide and deprovision system access.You have an equally crucial role to partner collectively with stakeholders to mature, streamline, and automate Identity and Access Management procedures for Blackbaud. What you’ll do Ensure appropriate Control through timely removal of unnecessary or inappropriate system access Expediently provision approved access, often utilizing evolving Role Based Access Controls (RBAC), for Blackbaud systems to prevent excessive permissions and rights. Proactively expand approved RBAC roles through analysis, recommendation and adoption/rollout. Analyze and resolve access issues, coordinating with system owners or technical support resources as necessary. Participate in ongoing audits and assessments, and assist with implementation of audit or compliance recommendations Develop and maintain detailed documentation on standard operating procedures, system configurations, and technical settings for internal team use, end user support Identify , evaluate and recommend opportunities to eliminate, streamline, and automate access management practices.Partner with colleagues including application owners, cloud engineers, cyber security SMEs, etc. to effectively execute improvements based on expected value. Generate reports to perform in-depth analysis and data collection for issues associated with IAM What you’ll bring 2 years of experience in Identity or Access Management Tireless adherence and attention to appropriate IT general computing controls Ability to understand, work with and where appropriate leverage various technologies including PowerShell , ServiceNow, SailPoint's Identity-Now, Active Directory, EntraID , Salesforce, Workday, etc. Practical experience with SCA, ITIL, COBIT, NIST and/or other security and control frameworks Stay up to date on everything Blackbaud, follow us on Linkedin, X, Instagram, Facebook and YouTube Blackbaud is a digital-first company which embraces a flexible remote or hybrid work culture. Blackbaud supports hiring and career development for all roles from the location you are in today! Blackbaud is proud to be an equal opportunity employer and is committed to maintaining an inclusive work environment. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, physical or mental disability, age, or veteran status or any other basis protected by federal, state, or local law.
Posted 1 month ago
3.0 - 7.0 years
9 - 13 Lacs
Bengaluru
Work from Office
Identity and Access Management Senior Advisor The Dell Security & Resiliency organization (SRO) manages the security risk across all aspects of Dell s business. You will have an excellent opportunity to influence the security culture at Dell and further develop your career. What you ll achieve As an Identity and Access Management Senior Advisor specializing in Single Sign-On (SSO) and Multi-Factor Authentication (MFA), you will be a key contributor to our security team. In this role, you will design, implement and maintain cutting-edge authentication solutions using Okta, Ping Identity, and Entra ID technologies. Your efforts will transform complex business challenges into comprehensive, end-to-end solutions, enhancing our authentication capabilities and supporting data-driven decision-making. Ultimately, you will ensure secure and seamless application access for our global user base, delivering substantial business value and improving our overall security posture. You will: Design and deploy advanced single sign-on (SSO) and multi-factor authentication (MFA) solutions using Okta, PingFederate, and Entra ID in collaboration with cross functional teams using an agile methodology Enable applications with single sign-on and MFA, provide support to the Operations team, conduct root cause analysis, remediate system vulnerabilities, ensure services are kept up to date and maintain technical documentation. Drive key projects including Okta/Okta Verify setup and implementation, Kubernetes on BareMetal (KOB) migration, Microsoft Entra MFA enhancements to align with Dell s technology roadmap. Automate IAM processes through scripting (PowerShell, Python, Bash, Java, etc.) and create innovative solutions to streamline, standardize, simplify, and enhance application technologies. Participate in a rotating on-call schedule to respond to IAM alerts and incidents outside of regular business hours, including weekends and holidays. Take the first step towards your dream career Every Dell Technologies team member brings something unique to the table. Essential Requirements Proven expertise in implementing and managing SSO and MFA solutions using Okta, Entra ID, or PingFederate, with a strong understanding of authentication protocols such as LDAP, SAML, OAuth2/OIDC, and FIDO2. Experience with API usage (Okta, Entra ID) for automating workflows and system integrations activities. Hands on experience with scripting languages such as Python, Bash, and PowerShell Lead technical troubleshooting and support efforts, working closely with customers and stakeholders to resolve complex identity-related issues. Coordinate with customers, operations, stakeholders to align on requirements, standards and end state implementation goals. Experience with Windows Server administration, Linux Server environments, PKI management and SSL certificate management. Desirable Requirements Using tools such as Splunk to perform usage reporting, auditing and logging with Directory Services Products 8+ years of professional experience in a Cybersecurity engineering role with a Bachelor s degree; or 5+ years with a Master s degree, or equivalent experience We believe that each of us has the power to make an impact. That s why we put our team members at the center of everything we do. If you re looking for an opportunity to grow your career with some of the best minds and most advanced tech in the industry, we re looking for you. Dell Technologies is a unique family of businesses that helps individuals and organizations transform how they work, live and play. Join us to build a future that works for everyone because Progress Takes All of Us. Application closing date: 28-Mar-25 Dell Technologies is committed to the principle of equal employment opportunity for all employees and to providing employees with a work environment free of discrimination and harassment. Read the full Equal Employment Opportunity Policy here
Posted 1 month ago
3.0 - 7.0 years
9 - 13 Lacs
Bengaluru
Work from Office
Identity and Access Management Senior Advisor The Dell Security & Resiliency organization (SRO) manages the security risk across all aspects of Dell s business. With team members located in over fifteen countries, you will have an excellent opportunity to influence the security culture at Dell and further develop your career. What you ll achieve As an Okta Developer, you will be primarily responsible for integrating applications with Okta and customizing Okta functionality to provide self-service capabilities, including scripting, and API integration. You will also be implementing complex authentication solutions using our modern IAM technology stack that includes technologies like Entra, Azure AD, CyberArk, etc. This role requires strong Okta skills as well as strong foundational IAM domain expertise. You will: Design, develop, and implement Okta solutions focused on authentication (single sign-on, multi factor authentication). Create and automate workflows in Okta to streamline authentication request, access requests, and certificate renewals. Develop custom integrations between Okta and other enterprise systems using Okta APIs and SDKs. Customize Okta policies and access controls to align with business requirements and security standards. Work closely with cross-functional teams (IT, security, compliance) to ensure proper implementation of identity governance and compliance standards. Take the first step towards your dream career Every Dell Technologies team member brings something unique to the table. Here s what we are looking for with this role: Essential Requirements Proven expertise in implementing and managing SSO and MFA solutions using Okta, Entra ID, or PingFederate, with a strong understanding of authentication protocols such as LDAP, SAML, OAuth2/OIDC, and FIDO2. Experience with API usage (Okta, Entra ID) for automating workflows and system integrations activities. Hands on experience with scripting languages such as Python, Bash, and PowerShell Lead technical troubleshooting and support efforts, working closely with customers and stakeholders to resolve complex identity-related issues. Coordinate with customers, operations, stakeholders to align on requirements, standards and end state implementation goals. Experience with Windows Server administration, Linux Server environments, PKI management and SSL certificate management. Preferred Qualifications: Okta certifications (e.g., Okta Certified Professional, Okta Certified Administrator) Experience with Infrastructure as a code tools such as Terraform and /or Ansible We believe that each of us has the power to make an impact. That s why we put our team members at the center of everything we do. If you re looking for an opportunity to grow your career with some of the best minds and most advanced tech in the industry, we re looking for you. Dell Technologies is a unique family of businesses that helps individuals and organizations transform how they work, live and play. Join us to build a future that works for everyone because Progress Takes All of Us. Application closing date: 28-Jun-25 Dell Technologies is committed to the principle of equal employment opportunity for all employees and to providing employees with a work environment free of discrimination and harassment. Read the full Equal Employment Opportunity Policy here
Posted 1 month ago
4.0 - 8.0 years
6 - 10 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
Bachelor s degree in computer science, Information Security, orrelated field 7+ years of experience in security engineering, cloud security, or compliance Strong knowledge of cloud security concepts, principles, and practices Familiarity with cloud security best practices and frameworks (e.g., CISv8, NIST, ISO, CSA) Experience in creating and maintaining security documentation, such as policies, standards, procedures, and guidelines. Experience with tool sets relevant to modern cloud operations like SIEM, WAF, vulnerability scans, pen tests, CIS benchmarking, etc. Working knowledge of OWASP Web/API vulnerabilities (CSRF, XSS, SQLI, etc.) and compensating controls. Knowledge of Web/API security architecture common authentication and authorization technologies (OIDC, OAuth2, Spring Security, HMAC, WS-Security, WS-Trust). Solid understanding of applied cryptography fundamentals (Encryption, Authentication, Symmetric Cryptography, Asymmetric Cryptography etc.). Ability to translate complex technical concepts into clear and concise language for diverse audiences and Attention to detail with quality assurance. Hands-on experience with security tools, frameworks for cloud platforms (e.g., AWS, Azure, GCP) and technologies (e.g., firewalls, encryption, identity and access management, vulnerability scanning, penetration testing) Experience with security standards and regulations for cloud environments (e.g., ISO 27001, SOC 2, PCI DSS, HIPAA, GDPR) Experience with scripting languages (e.g., Python, Bash, PowerShell) Excellent communication, collaboration, and problem-solving skills Certifications in cloud security or compliance (e.g., AWS Certified Security Specialty, Azure Security Engineer, CCSK, CCSP) are Mandatory. Basic Requirements - Effective verbal and non-verbal communication skills at all levels of the organization - Leadership teamwork and collaboration - Discretion - Problem solving - Critical Thinking - Self-initiated/sufficient - Motivated
Posted 1 month ago
5.0 - 8.0 years
8 - 11 Lacs
Bengaluru
Work from Office
Implement and review IT security technologies in Infrastructure, applications and cloud platforms for effective enforcement of policies. Periodic review of user and privileged access management for infrastructure and applications. Maintaining updated information security documentation including standard operating procedures, review records. Design and implementation of security use cases in Security incident event management and end point security policies. Act as a first responder for cyber security incidents and part of cyber security incident response team by working in close coordination with IT infrastructure and application teams. Conduct vulnerability assessment with IT systems and collaborate with stakeholders for remediation of vulnerabilities. Implement and review IT security technologies in Infrastructure, applications and cloud platforms for effective enforcement of policies. Periodic review of user and privileged access management for infrastructure and applications. Maintaining updated information security documentation including standard operating procedures, review records. Design and implementation of security use cases in Security incident event management and end point security policies. Act as a first responder for cyber security incidents and part of cyber security incident response team by working in close coordination with IT infrastructure and application teams. Conduct vulnerability assessment with IT systems and collaborate with stakeholders for remediation of vulnerabilities. Educational Qualifications and experience: Bachelors degree in science, engineering discipline Minimum of 5 years experience IT operations with at least 2-3 years of hands-on experience with cyber security technologies. Competency in applying the cyber/information security frameworks and standards such as MITRE, NIST and ISO 27001
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identity and access management, and professional services designed to manage the cybersecurity risks of enterprise clients. We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the most advanced cyber threats. We leverage our global scale and decades of experience to accelerate our clients cyber outcomes through a full lifecycle of cybersecurity services. We are a global company with operating centers in the United States, Canada, the United Kingdom, and India. About the Job: We are seeking a skilled and driven Dark Web Researcher to join our Threat Intelligence team. In this role, you will leverage the CyberInt platform and a suite of dark web and threat actor monitoring tools to proactively identify emerging risks, data exposures, and threat activity targeting our clients across industries such as healthcare, education, and finance. You will play a key role in brand protection, leaked credential discovery, social media risk analysis, and monitoring for phishing domains and attack surface exposures. Your research will extend to initial access brokers (IABs) and dark web chatter that could signal intent or active targeting of our clients. Youll also support our threat hunting operations by creating queries and validating whether observed risks have materialized into active threats Responsibilities: Monitor and analyze dark web forums, marketplaces, Telegram channels, and leak sites using CyberInt and other OSINT/darknet tools. Identify and assess: Leaked credentials and sensitive data Phishing domains and impersonation sites Threat actor discussions mentioning client brands or environments Sale of access by Initial Access Brokers (IABs) Track emerging threat actor TTPs, malware families, ransomware groups, and underground ecosystem trends. Correlate dark web findings with client infrastructure and attack surface to assess risk and exposure. Develop threat hunting queries (e.g., using SIEM/EDR platforms) based on dark web discoveries to determine active targeting or compromise Create concise, actionable intelligence reports to communicate risks to internal and client stakeholders. Assist in incident enrichment, providing dark web context and attribution to ongoing investigations or IR cases Stay current on major malware and ransomware variants, and support attribution or profiling work when actors reference client asset Requirements: 3+ years of experience in threat intelligence, dark web research, or cybercrime investigations Hands-on experience with CyberInt or similar dark web intelligence platforms (e.g., Flashpoint, Cybersixgill, KELA, Recorded Future) Strong OSINT skills and familiarity with darknet environments and tradecraft Understanding of malware families, ransomware operations, and threat actor group dynamics Experience with brand protection monitoring, phishing detection, and social media threat analysis Ability to write clear, intelligence-driven reports for technical and executive audiences Familiarity with attack surface management and common enterprise exposure risk Preferred Qualifications: Experience tracking Initial Access Brokers (IABs) and ransomware affiliates Knowledge of security risks specific to healthcare, education, and financial sectors Basic scripting or automation skills (Python, Regex, etc.) for hunting or parsing data Experience writing threat hunting queries (e.g., Splunk, Elastic, Sigma rules) Previous consulting or client-facing experience in intelligence reporting or briefings Note: This job posting is intended for direct applicants only. We request that outside recruiters do not contact us regarding this position.
Posted 1 month ago
4.0 - 7.0 years
6 - 10 Lacs
Noida
Work from Office
Join our Team About this opportunity: Ericsson is currently seeking a dynamic MS Core and Cloud Specialist. This vital role is grounded in technology leadership and expertise, and it will interface with a variety of our Core and Cloud domains, including CS Core, PS Core, IMS, IP Core, and Cloud. As part of the Ericsson Operations Engine, your responsibilities span the full cycle of Create, Sustain and Evolve, making a pivotal impact on our Managed Services deliveries. What you will do: - Leverage your Core and Cloud domain expertise to support our Domain Support and Automated Operations teams. - Assist our Automation and Analytics team by offering Core and Cloud domain knowledge to facilitate analytics and automation use cases. - Design and uphold solutions predicated upon automation use case candidates, while investigating potential problems associated with automation components. - Enhance and propel recovery processes. - Create, preserve, and augment automated Service Delivery methodologies. - Carry out a trend analysis to proactively identify potential issues, initiating restoration and repair as necessary. The skills you bring: - Ericsson Operations Engine - Mode Of Operations. - Overall understanding of Automation?. - Subscriber data management Security. - Lifecycle Management. - Identity And Access Management. - 5G Core Architecture. - Troubleshooting skills. - Network Performance. - Database Management Systems. - MSTOP Multi Vendor Support. - Work Level Agreement (WLA) and Service Level Agreement (SLA). - Customer Experience. - ITIL Framework.
Posted 1 month ago
6.0 - 8.0 years
9 - 14 Lacs
Pune
Work from Office
Some careers shine brighter than others. If you re looking for a career that will help you stand out, join HSBC and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. HSBC is one of the largest banking and financial services organisations in the world, with operations in 64 countries and territories. We aim to be where the growth is, enabling businesses to thrive and economies to prosper, and, ultimately, helping people to fulfil their hopes and realise their ambitions. We are currently seeking an experienced professional to join our team in the role of a Senior Consultant Specialist. Work Location Open for: Pune/Hyderabad/Bangalore In this role, you will: Identify and streamline the automated test cases as per the project requirements Ensure the automated scripts cover all the functional requirements. Ensure to execute the projects within defined timelines and maintain standards of quality scripting. Co-ordinate with test manager/ onsite coordinator for issues resolution Ensure that test product documentation is complete and updated and updated at any given point in time. Own the project and ensure to handle Complex Modules to help meet project timelines Responsible for status reporting and test metrics reporting periodically Prepare maintain test-ware conduct/ attend test-ware walkthroughs Design of reusable automated test scripts and guide the team in the critical component s automation Requirements To be successful in this role, you should meet the following requirements: Working experience not less than 6-8 years in Automation Testing with Selenium Good experience in build and test integration tooling including Jenkins, GIT. Excellent knowledge on the Java scripting. Proven skill set for the Automation experience with API Automation, BDD, TDD frameworks. Able to handle complex functionalities and to develop re-useable scripts. Able to develop, debug, troubleshoot, and maintain the scripts. Maintain a high level of coding standards and quality assurance policy and procedures. Positive team player working as part of a large programme. The successful candidate will also meet the following requirements: Experience of working on project running on Google Cloud for Pega. Knowledge of Payment Solution is added advantage. Previous experience within Identity and Access Management, SQL Previous experience on the UFT automation. Test case review/QA for coverage and traceability to requirements/design and liaison with business areas/technical leads re SIT/OAT/UAT scenario definitions as required. Agile basics including ceremonies, Scrum/Kanban. CI/CD testing automation tools and frameworks Knowledge of Jira, Confluence, and Sharepoint.
Posted 1 month ago
4.0 - 6.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Knowledge and experience 4-8 years of experience in information security with an emphasis on risk assessment and/or risk management End-to end implementation of ISO 27001 risk management framework Demonstrated ISO 27001 or other standard audit framework skillset in several information security domains - Mandatory Experience conducting successful information security risk assessments – Mandatory requirement Experience conducting successful third party information security risk assessments – Preferred Demonstrated understanding & functional knowledge of technical domains of risk assessments to include at a minimum: - Mandatory Network security Identity and Access Management (IAM) Asset security Operational security Cloud Security VM Experience with GRC tools (e.g. RSA Archer) –Preferred Certifications such as ISO 27001 LA, CISSP and/or CRISC are preferred Skillset Proficiency in Microsoft Office suite, including PowerPoint, Excel, Visio, Word Able to manage multiple projects simultaneously, with strong ability to prioritize multiple tasks and respond to emergencies, organize and schedule work effectively Bold, decisive manner but not overbearing; capability to interact with many new individuals in different contexts week-to-week Exceptional communication, collaboration, and advocacy skills, both verbal and written, with the ability to express complex and technical issues as understandable language to all levels of personnel within Sony, and with clients and other stakeholders Must work well with others in a globally and culturally diverse environment Excellent analytical and problem solving skills Required Skills: RISK ASSESSMENTS Third party Risk management ISO 27001 Risk Management Cloud Risk Analyst Roles and Responsibilities Analyst will be responsible for conducting end to end information security risk assessments to identify, rank, document and ensure treatment of risks in a timely manner Job Description Conduct risk assessments to identify, assess, rank, and monitor information security risks for Sony group third parties Conduct risk assessments to identify, assess, rank, and monitor information security risks to Sony group internal assets Ensure risk recommendations are made and have action plans documented in the enterprise risk management tool Have regular meetings with internal & external stakeholders to ensure risk recommendations are tracked, updated and eventually closed Keep Sony management updated on the status of risk assessments, treatment, and closure Advise and make recommendations regarding appropriate personnel, physical, and technical security controls required for mitigating identified security risks Act as an information security advisor to SIE business and technology groups
Posted 1 month ago
7.0 - 11.0 years
15 - 20 Lacs
Bengaluru
Work from Office
Sr. Security Automation Engineering Lead The Dell Security Resiliency organization manages the security risk across all aspects of Dell s business. With team members located in over 15 countries, you will have an excellent opportunity to influence the security culture at Dell and further develop your career. We are currently seeking a Sr. Security Automation Engineering Lead to drive the design and implementation of scalable, automated security solutions across our technology landscape. This role will play a pivotal part in transforming how we detect, respond to, and prevent security risks by embedding automation into every layer of our security and engineering processes. Join us to do the best work of your career and make a profound social impact as a Sr. Security Automation Engineering Lead on our Team in Bangalore . What you ll achieve As a senior technical leader, you will work closely with cross-functional teams including product security, DevOps, IT, and AI engineering to build intelligent and resilient automation pipelines. This position requires deep hands-on experience with programming, security infrastructure, and modern AI technologies. If you re passionate about proactive security, enjoy solving complex problems at scale, and want to shape the future of secure automation, we d love to hear from you. You will: Design, implement, and maintain scalable systems and tools to automate complex security tasks across cloud and on-prem environments. Build and optimize security workflows, pipelines, and orchestration processes to improve operational efficiency and reduce manual effort. Collaborate with cross-functional teams (DevOps, SecOps, IT, and Developers) to gather requirements and embed security capabilities into core business and engineering workflows. Advocate for security best practices and automation across the organization, serving as a thought leader and mentor within the engineering team. Maintain comprehensive documentation including architecture diagrams, runbooks, playbooks, and automation logic. Take the first step towards your dream career Every Dell Technologies team member brings something unique to the table. Here s what we are looking for with this role: Essential Requirements Excellent communication skills, with the ability to lead and influence cross-functional teams in technical discussions. Deep understanding of security domains including identity access management, vulnerability management, secrets management, and threat detection. Demonstrated ability to design and maintain CI/CD-integrated security automation, leveraging tools such as Ansible, Terraform, Jenkins, and GitHub Actions. Hands-on experience with scripting and programming languages, including Python, PowerShell, Bash, and TypeScript/Node.js. Familiarity with RESTful APIs, webhooks, and integration of third-party security tools and services via automation Desirable Requirements AI Agentic Technologies: Hands-on experience with Agentic AI frameworks, LLMs, and orchestration libraries like LangChain, Semantic Kernel, or RAG-based architectures Experience building AI-powered security tools, chatbots, and agent-driven automation pipelines Application closing date: 30 - May - 2025
Posted 1 month ago
6.0 - 11.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identity and access management, and professional services designed to manage the cybersecurity risks of enterprise clients. We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the most advanced cyber threats. We leverage our global scale and decades of experience to accelerate our clients cyber outcomes through a full lifecycle of cybersecurity services. We are a global company with operating centers in the United States, Canada, the United Kingdom, and India. About the Job: Cyderes Threat Fusion Team is looking for a highly skilled threat researcher to conduct malware research in support of global security operations. This team will support multiple groups within the company, to include Threat Intelligence, Threat Hunting, DFIR, and MDR, with expert malware research services. The malware research team will also be responsible for tracking malware families, creating and updating kill chains, reverse engineering, and tracking nation-state threat actor activity. In addition, they will create hunting queries and conduct hunting operations in client environments. Other duties for this team include: Responsibilities: Function as a centralized malware reversing team for the companys needs. (support DFIR, Hunters, MDR, etc.) Track threat actors and campaigns via malware research, code reuse, infrastructure usage, general threat profiling. Create, test, verify efficacy for intel-based threat hunting queries for emerging threats. Create a library of actionable threat briefing that include quick analysis, context, and investigative steps for emerging threats (malware families, zero days, major campaigns) (2-5 page quick hit publications). Create white papers with in-depth threat analysis when threat discoveries warrant deeper dive reporting. Create profiles, kill chains, preferred targets, regions, etc for major threat actors / ransomware families This team will actively conduct global threat hunting for emerging threats. Requirements: 6+ years of hands-on experience in Malware Reverse Engineering Proficiency in researching threat actors and producing intelligence reports Malware reverse engineering expertise across Windows, Linux, and OSX samples. Tools should include IDAPRO, OLLYDBG, and similar. OSINT knowledge, using popular sources to expand understanding of threat groups. Advanced VirusTotal research skills, to include retro hunting and API connections. Knowledge of current ransomware groups and other malware families, to include TTP s, code structure, and typical kill chains. Knowledge of DarkWeb research and investigation using popular tool sets. Advanced investigative skills using popular EDR Tools, such as CrowdStrike, SentinelOne, and Microsoft Defender. Able to craft complex queries in their respective query languages. Skilled in querying and reviewing data in popular SIEMS, such as Splunk and Google Chronicle. Skilled in writing concise, compelling, and actionable intelligence reports in English. Able to lead intelligence briefings with customers in English. Note: This job posting is intended for direct applicants only. We request that outside recruiters do not contact us regarding this position.
Posted 1 month ago
6.0 - 10.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Clifyx Technology. is looking for SAP Security Professional to join our dynamic team and embark on a rewarding career journey. SAP Security is a crucial aspect of the SAP system, responsible for ensuring the confidentiality, integrity, and availability of the data processed by the system A SAP Security professional is responsible for:1 Designing and implementing SAP security strategies and policies to secure the SAP landscape2 Configuring user access, authorization, and authentication in SAP systems3 Monitoring and auditing SAP system logs to detect potential security breaches4 Ensuring data privacy and compliance with relevant regulations and standards5 Maintaining and updating SAP security documentation6 Providing technical support to end-users and addressing their security-related queries7 Keeping abreast of new threats and technologies related to SAP security and proactively implementing measures to mitigate them The ideal candidate should have a good understanding of SAP security best practices, in-depth knowledge of SAP authorization concepts, experience with SAP GRC, and familiarity with security technologies such as firewalls, encryption, and identity management solutions
Posted 1 month ago
2.0 - 4.0 years
4 - 6 Lacs
Bengaluru
Work from Office
The Role: Our Platform Management engineers oversee the health, scalability and security of our cloud infrastructure. They take hands-on responsibility for maintaining and evolving the systems, services and tools shared across the engineering teams. In addition, they use their in-depth understanding of cloud development to advise, coach and assist the engineering teams as they evolve to respond to the ever-growing needs of our customers. We re looking for an experienced Dev Ops Engineer to join us and help us maintain a healthy, scalable platform that will meet the ever-increasing demands on our rapidly growing platform. Responsibilities: DevOps Concepts and Execution: Comprehensive knowledge of DevOps methodologies, core principles, and best practices, encompassing continuous integration, continuous delivery, and automation. Cloud Service Providers: Skilled in using cloud platforms such as AWS, GCP, among others, including services like compute, storage, networking, and serverless architectures. Containerization and Orchestration Tools: Proficient in container technologies like Docker and orchestration platforms such as Kubernetes for effective deployment, scaling, and application management. Infrastructure Automation (IaC): Experienced with infrastructure as code tools like Terraform, CloudFormation, or Ansible to automate the setup and management of infrastructure. CI/CD Pipeline Management: Capable of establishing and maintaining continuous integration and continuous delivery pipelines using tools such as Jenkins, GitLab CI/CD, CircleCI, and others. Scripting and Development Languages: Strong skills in scripting languages like Bash, Python, or Groovy, and proficient in programming languages relevant to DevOps, such as Java, Ruby, and Python. Monitoring and Logging Solutions: Knowledgeable about monitoring tools like Prometheus, Grafana, the ELK stack, and skilled in setting up efficient monitoring and alerting systems. Security and Compliance Practices: Understanding of security best practices, identity and access management (IAM), and the ability to secure applications and infrastructure effectively. Networking Knowledge: Familiar with networking basics, including TCP/IP, DNS, load balancing, and firewalls. Collaboration and Communication Tools: Proficient in using tools like Slack, JIRA, Confluence, or similar platforms to enhance team communication and coordination. Problem-Solving and Troubleshooting: Capable of analyzing complex technical issues, diagnosing problems, and implementing effective solutions. Required Skills: At least 2+ years of technology experience. 2+ years of working experience in Python, Kubernetes, and AWS/GCP. Hands-on experience on managing build tools like Jenkins, Bitbucket Pipelines, GitHub Actions. Implement solutions to improve performance and scalability by identifying inefficiencies in developer workflows, tools, and implement solutions to improve performance and scalability. Hands-on experience using IaC tools like Terraform/Terragrunt. Experience working on Linux based infrastructure Excellent understanding of Ruby, Python, and Java. Expert technical troubleshooting skills and/or the ability to implement processes and controls to find root cause. Proven ability to learn new technologies quickly. The ideal candidate should have handled operations, deployment, and security of multiple SaaS/B2C products Hands-on in log collection designs like EFK and metric collection tools like a new relic, Prometheus/Grafana or SignalFx Hands-on in the design, creation, and consumption of RESTful API, and Microservice architectures on public clouds preferably AWS/GCP. Excellent analytical, communication, and coding skills are a must.
Posted 1 month ago
2.0 - 5.0 years
4 - 7 Lacs
Bengaluru
Work from Office
Hiring for-IAM- CIAM Support (ForgeRock)-Delhi Bangalore He/She will be responsible for developing and managing identity and access management solutions using Forgerock technologies . You will collaborate with various teams to ensure secure and efficient integration Contributing to the overall security strategy of the organization.
Posted 1 month ago
7.0 - 10.0 years
9 - 12 Lacs
Gurugram
Work from Office
KeySkills: JAVA, PYTHON, PRIVILEGED ACCESS MANAGEMENT ARCHITECT, PRIVILEGE, IDENTITY ACCESS MANAGEMENT (PAM) SYSTEMS, ACTIVE DIRECTORY, MFA PROCESS, IAM PROTOCOLS, SAILPOINT, SAVIYNT, BEYONDTRUST, CYBERARK, DELINEA, THYCOTIC, ON-PREM, CLOUD BASED PAM SOLUTIONS, IDENTITY SECURITY DOMAIN, CYBERSECURITY CONTROLS, PAM INFRASTRUCTURE SYSTEMS, HLD, LLD, IMPLEMENTATION GUIDE, OPERATION MANUALS As a Privileged Access Management Architect, your role and responsibilities would include: Hands-on expertise on Designing, developing, testing, implementing, and integrating Privilege and Identity Access Management (PAM) systems with a large enterprise Expertise with Active Directory, MFA process and IAM protocols, etc. for authentication Experience with identity governance products like SailPoint, Saviynt, BeyondTrust etc Experience in Privilege Access Management products like CyberArk, Delinea, Thycotic Hands-On expertise for On-Prem as well as cloud based PAM solutions. Hands on experience in the Identity Security domain Assessing requirements for PAM solutions to meet stakeholders needs Designing technical cybersecurity controls and define standards and best practices in the application of PAM principles and best practices Driving requirements and design specifications for privileged access management solutions and collaborating with others in performing these activities Providing escalation support for production PAM infrastructure systems and processes where applicable Identifying and documenting privileged account management business and technical use cases Developing PAM best practices and solutions for common client problems Facilitating the continuous adoption, training, communication, and education of PAM capabilities, functions, and standards to our teams and clients. Very good with documentation of HLD, LLD, Implementation guide and Operation Manuals
Posted 1 month ago
1.0 - 6.0 years
6 - 10 Lacs
Pune
Work from Office
Job Role: Access management Location: Pune Experience: 1+ years Roles and responsibilities Information Security Analyst with demonstrated knowledge and experience in Access Management Operations specific to Active directory and Windows platform in terms of Provisioning and De Provisioning access as per the requirement. The Analyst should be able to work well with teams and work independently. Job Description: Provisioning and De Provisioning of access to users through Active Directory. Analyse and resolve tickets related to Security groups, Privileged accounts and Enterprise password vaulting. Should be able to work and resolve requests related to Service Accounts. Proactive in identifying gaps and helping the team in streamlining process Ability to identify and contribute towards mitigating risk. Collaborates with extended team for joint deliverables Good understanding on File share, permissions, DFS, namespace, and replication. Analyst will be part of on call support team on rotation Should be flexible to work in shifts(24*7)
Posted 1 month ago
6.0 - 11.0 years
2 - 6 Lacs
Gurugram
Work from Office
AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. AtAHEAD, we prioritize creating a culture of belonging,where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer,anddo not discriminatebased onan individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, maritalstatus,or any other protected characteristic under applicable law, whether actual or perceived. We embraceall candidatesthatwillcontribute to the diversification and enrichment of ideas andperspectives atAHEAD. As a M365 Engineer, you will be responsible for managing, maintaining, and optimizing our organization's M365 environment. You will play a critical role in ensuring the integrity, security, and efficiency of our email systems and identity management processes. Key Responsibilities: Exchange Online Management: Administer and manage Exchange Online services, including mailboxes, groups, rules, and policies. Implement and maintain email authentication & security measures via Defender for Office 365 & Exchange Online Protection Identify, diagnose, and troubleshoot complex issues related to Exchange Online and its dependencies throughout end-to-end mail flow Monitor and optimize the performance and availability of Exchange Online services. Conduct regular system audits to ensure compliance with company policies and industry standards. Identity Lifecycle Management: Managing identity and access in the Microsoft Cloud including secure Hybrid environments (sign-on security, MFA, device sign-on methods, Azure Seamless SSO, application registration) Implement and enforce identity and access management policies (compliance and conditional access policies, device compliance policy, conditional access policy, PIM, RBAC, user risk and sign-in risk policy) Knowledge of SAML, OpenID Connect, OAuth, JSON, SPML, SCIM, XACML integration standards Coordinate with IT security teams to ensure the security of identity management solutions. Troubleshoot and resolve identity-related issues. Collaboration and Support: Collaborate with cross-functional teams to integrate Exchange Online and identity management solutions with other IT systems. Provide expert-level support and training to end-users and IT staff. Keep abreast of new technologies and best practices in Exchange Online and identity management. Project Management: Lead and participate in IT projects related to email and identity management. Document processes and maintains detailed records of system configurations and changes. Qualifications: Bachelors degree in Computer Science, Information Technology, or related field. 6+ years of experience in managing Exchange Online, Azure, identity management solutions. Intune, Teams, and the M365 technology stack Strong knowledge of Microsoft Exchange, Azure Active Directory, and other identity management technologies. Experience with PowerShell scripting for automation and administration. Experience/working knowledge with cloud technologies and hybrid environments. Excellent problem-solving skills and attention to detail. Strong communication and teamwork abilities. Preferred Skills: Certifications in relevant technologies (e.g., Ms-220, MS-100, MS-200, MS-300, MS-500, MD-101, AZ-140) Experience in migrating on-premises Exchange to Exchange Online. Knowledge of IT security standards and compliance regulations. Why AHEAD: Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between. We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning. USA Employment Benefits include - Medical, Dental, and Vision Insurance - 401(k) - Paid company holidays - Paid time off - Paid parental and caregiver leave - Plus more! See benefits https://www.aheadbenefits.com/ for additional details. The compensation range indicated in this posting reflects the On-Target Earnings (OTE) for this role, which includes a base salary and any applicable target bonus amount. This OTE range may vary based on the candidates relevant experience, qualifications, and geographic location.
Posted 1 month ago
7.0 - 10.0 years
11 - 16 Lacs
Pune
Work from Office
ZS is a place where passion changes lives. As a management consulting and technology firm focused on improving life and how we live it , our most valuable asset is our people. Here you’ll work side-by-side with a powerful collective of thinkers and experts shaping life-changing solutions for patients, caregivers and consumers, worldwide. ZSers drive impact by bringing a client first mentality to each and every engagement. We partner collaboratively with our clients to develop custom solutions and technology products that create value and deliver company results across critical areas of their business. Bring your curiosity for learning; bold ideas; courage an d passion to drive life-changing impact to ZS. Our most valuable asset is our people . At ZS we honor the visible and invisible elements of our identities, personal experiences and belief systems—the ones that comprise us as individuals, shape who we are and make us unique. We believe your personal interests, identities, and desire to learn are part of your success here. Learn more about our diversity, equity, and inclusion efforts and the networks ZS supports to assist our ZSers in cultivating community spaces, obtaining the resources they need to thrive, and sharing the messages they are passionate about. Information Security Project Specialist ZS’s India Capability & Expertise Center (CEC) houses more than 60% of ZS people across three offices in New Delhi, Pune and Bengaluru. Our teams work with colleagues across North America, Europe and East Asia to create and deliver real world solutions to the clients who drive our business. The CEC maintains standards of analytical, operational and technological excellence across our capability groups. Together, our collective knowledge enables each ZS team to deliver superior results to our clients. What You’ll Do Executes the end-to-end management of security projectsincluding resource management, communications, training requirements, change management and budget (if applicable). Estimate the resources and participants needed to achieve project goals. Reviews and recommends changes, reductions or additions to the overall project Acts as the liaison between InfoSec and end-users when applicable Maintains the efficiency of the project management process such as planning, scheduling, and budget and risk assessment. Identifies and mitigates potential risks Work with cross-functional teams and staff of all levels, including assisting in the development, training and assignment of work/projects to team members reporting to others; Works well within a structured environment in which team members can work together as an efficient team. What You’ll Bring Bachelor’s Degree required. 7 - 10 years of relevant work experience, including Information Security, project management (5+ years), and team management. PMP-PMI certification desired, or completion within a year of assuming the position. Agile certification desired, or completion within a year of assuming the position. Security+ or equivalent certification desired, or completion within a year of assuming the position. (CISM- Certified Information Security Manager, CompTIA Security+, Etc ) Project plan development experience, including charter, scope, project management approach, management plans, statement of work, cost estimates, schedule. Excellent communication (written and oral) and interpersonal skills; ability to interface and influence all levels within the organization, including facilitation, consulting, negotiation, and presentation. Excellent project management and coordination skills working with multiple stakeholders across several technology platforms and business areas Strong technical skills and experience. The ideal candidate has lead projects relating to Information Security deliveries or migrations (Vulnerability Management, Identity and access management, Cloud Strategy & Governance, Data Security, Enterprise Risk Management, Asset Management, Security awareness & training) Project plan and budget management. Knowledge of project management best practices, Experience identifying and mediating risk. Perks & Benefits: ZS offers a comprehensive total rewards package including health and well-being, financial planning, annual leave, personal growth and professional development. Our robust skills development programs, multiple career progression options and internal mobility paths and collaborative culture empowers you to thrive as an individual and global team member. We are committed to giving our employees a flexible and connected way of working. A flexible and connected ZS allows us to combine work from home and on-site presence at clients/ZS offices for the majority of our week. The magic of ZS culture and innovation thrives in both planned and spontaneous face-to-face connections. Travel: Travel is a requirement at ZS for client facing ZSers; business needs of your project and client are the priority. While some projects may be local, all client-facing ZSers should be prepared to travel as needed. Travel provides opportunities to strengthen client relationships, gain diverse experiences, and enhance professional growth by working in different environments and cultures. Considering applying At ZS, we're building a diverse and inclusive company where people bring their passions to inspire life-changing impact and deliver better outcomes for all. We are most interested in finding the best candidate for the job and recognize the value that candidates with all backgrounds, including non-traditional ones, bring. If you are interested in joining us, we encourage you to apply even if you don't meet 100% of the requirements listed above. ZS is an equal opportunity employer and is committed to providing equal employment and advancement opportunities without regard to any class protected by applicable law. To Complete Your Application: Candidates must possess or be able to obtain work authorization for their intended country of employment.An on-line application, including a full set of transcripts (official or unofficial), is required to be considered. NO AGENCY CALLS, PLEASE. Find Out More At www.zs.com
Posted 1 month ago
2.0 - 5.0 years
7 - 11 Lacs
Pune
Work from Office
ZS is a place where passion changes lives. As a management consulting and technology firm focused on improving life and how we live it , our most valuable asset is our people. Here you’ll work side-by-side with a powerful collective of thinkers and experts shaping life-changing solutions for patients, caregivers and consumers, worldwide. ZSers drive impact by bringing a client first mentality to each and every engagement. We partner collaboratively with our clients to develop custom solutions and technology products that create value and deliver company results across critical areas of their business. Bring your curiosity for learning; bold ideas; courage an d passion to drive life-changing impact to ZS. Our most valuable asset is our people . At ZS we honor the visible and invisible elements of our identities, personal experiences and belief systems—the ones that comprise us as individuals, shape who we are and make us unique. We believe your personal interests, identities, and desire to learn are part of your success here. Learn more about our diversity, equity, and inclusion efforts and the networks ZS supports to assist our ZSers in cultivating community spaces, obtaining the resources they need to thrive, and sharing the messages they are passionate about. What you’ll do Maintenance and integration of Privileged Access Management tool with enterprise environment Implementing Identity Security solutions according to best practices Communicate and engineer Active Directory solutions for enterprise teams Own troubleshooting of L2/L3 Active Directory issues to resolution Script Active Directory maintenance automations using Powershell and Python Ensure Active Directory and Privileged Access Management tool changes are documented via proper change management documentation and approval process Participate in necessary audits, generating required output examples Manage Active Directory and its capabilitiescertificate services, group policy, DNS, replication, etc Mentor junior colleagues with expectation of growth and transition of responsibilities What you’ll bring Forthcoming and clear communication, an ability to identify and communicate potential issues and their solutions Willingness to dive in to resolve problems not only with owned technology, but other dependent technologies Ability to identify opportunities to automate routine and repetitive tasks and implement automated solutions by way of Powershell and Python Microsoft Active Directory (replication, group policy, DNS, computer, user, and group management) Microsoft Active Directory Certificate Services Microsoft Active Directory Federated Services Microsoft Entra ID/Azure Active Directory SAML/SSO Privileged Access Management Preferred Microsoft Certified Server Administrator Preferred Microsoft Certified Server Engineer Preferred Microsoft CertifiedIdentity and Access Administrator Associate Perks & Benefits ZS offers a comprehensive total rewards package including health and well-being, financial planning, annual leave, personal growth and professional development. Our robust skills development programs, multiple career progression options and internal mobility paths and collaborative culture empowers you to thrive as an individual and global team member. We are committed to giving our employees a flexible and connected way of working. A flexible and connected ZS allows us to combine work from home and on-site presence at clients/ZS offices for the majority of our week. The magic of ZS culture and innovation thrives in both planned and spontaneous face-to-face connections. Travel Travel is a requirement at ZS for client facing ZSers; business needs of your project and client are the priority. While some projects may be local, all client-facing ZSers should be prepared to travel as needed. Travel provides opportunities to strengthen client relationships, gain diverse experiences, and enhance professional growth by working in different environments and cultures. Considering applying At ZS, we're building a diverse and inclusive company where people bring their passions to inspire life-changing impact and deliver better outcomes for all. We are most interested in finding the best candidate for the job and recognize the value that candidates with all backgrounds, including non-traditional ones, bring. If you are interested in joining us, we encourage you to apply even if you don't meet 100% of the requirements listed above. ZS is an equal opportunity employer and is committed to providing equal employment and advancement opportunities without regard to any class protected by applicable law. To Complete Your Application Candidates must possess or be able to obtain work authorization for their intended country of employment.An on-line application, including a full set of transcripts (official or unofficial), is required to be considered. NO AGENCY CALLS, PLEASE. Find Out More At www.zs.com
Posted 1 month ago
5.0 - 10.0 years
40 - 70 Lacs
Bangalore Rural, Bengaluru
Hybrid
Responsibilities: Design and implement secure frameworks and features (e.g., Passkeys). Collaborate with Security & Engineering to drive roadmap execution. Lead architecture decisions and participate in security-focused code reviews. Break down complex problems into agile deliverables. Mentor junior engineers and champion security best practices. Ensure secure, scalable solutions for internal tools and customer-facing products. Requirements: 5+ years in software engineering with leadership responsibilities. Proficient in Java (Spring), JavaScript/TypeScript, React, and CI/CD pipelines. Experience with Docker, Kubernetes, AWS, and IaC tools (Terraform, Ansible, etc.). Knowledge of authentication (SAML, JWT, OIDC), authorization, cryptography, and app security. Familiarity with security compliance (PCI DSS, SOC2, HIPAA, FedRAMP) is a plus. Strong communication and cross-functional collaboration skills.
Posted 1 month ago
3.0 - 8.0 years
6 - 16 Lacs
Gurugram, Chennai
Hybrid
Role & responsibilities Skillset : SDLC , TPRM Assessments & Cybersecurity (Major requirements or primary skillset) Strong knowledge of best practice processes and technologies across security domains especially related to identity and access management, network security, logging and monitoring. Knowledge of at least one cloud services platform (Amazon Web Services, Microsoft Azure, Google). Job Description: Security, Risk and Technology Strong knowledge of financial services and insurance industry regulations around security and privacy including the Gramm-Leach-Bliley Act, State Privacy Laws, Health Insurance Portability and Accountability Act (HIPAA), Fair Credit Reporting Act, SEC Rules 17a-3 and 17a-4, and state security breach disclosure notification laws. Ability to relate these regulations back to security controls. Understanding and application of information security standards and best practices including NIST Cybersecurity Framework, ISO 27001-4, CoBIT, Cloud Security Alliance, etc. Ability to identify risks, quantify them, and help recommend and design mitigations. Broad knowledge of Unix, Linux, Windows and mainframe server environments. Knowledge of various database platforms. Strong knowledge of best practice processes and technologies across security domains especially related to identity and access management, network security, logging and monitoring. Knowledge of at least one cloud services platform (Amazon Web Services, Microsoft Azure, Google Cloud or Oracle Cloud) Education / Experience: Security, compliance, audit or risk covering a wide area of technologies and security domains including those previously mentioned. Financial industry or highly regulated industry background (Insurance, Banking, etc.) Project work experience with a recognized security, audit, or risk consulting firm a plus CISSP, CISA, CISM or other security/control certifications a plus. Bachelors degree or higher – preferably in Computer Science, Engineering, or a related scientific fields Communication Excellent verbal and written communication skills Ability to develop and QA/oversee development of high quality project artifacts Ability to collaborate, influence and communicate successfully in different ways concisely to different audiences (i.e., in business terms to business people, in technical terms to technical people) Able to develop and present dashboards Engagement Proven ability to engage with customers (IT and Business) and consultants in a highly professional and competent manner. Understanding and experience with project life cycles using proven methodologies – from analysis through implementation with hands-on deliverable development. Ability to work in a matrix reporting environment A practiced ability to influence peers, customers and project teams to make security minded decisions and changes Ability to scope projects, developing project charters, requirements, documenting issues and work plans, vendor selection, product/process design and implementation, change management/communication a plus.
Posted 1 month ago
5.0 - 10.0 years
14 - 24 Lacs
Gurugram, Chennai
Work from Office
Role & responsibilities Skillset : SDLC , TPRM Assessments & Cybersecurity (Major requirements or primary skillset) Strong knowledge of best practice processes and technologies across security domains especially related to identity and access management, network security, logging and monitoring. Knowledge of at least one cloud services platform (Amazon Web Services, Microsoft Azure, Google). Job Description: Security, Risk and Technology Strong knowledge of financial services and insurance industry regulations around security and privacy including the Gramm-Leach-Bliley Act, State Privacy Laws, Health Insurance Portability and Accountability Act (HIPAA), Fair Credit Reporting Act, SEC Rules 17a-3 and 17a-4, and state security breach disclosure notification laws. Ability to relate these regulations back to security controls. Understanding and application of information security standards and best practices including NIST Cybersecurity Framework, ISO 27001-4, CoBIT, Cloud Security Alliance, etc. Ability to identify risks, quantify them, and help recommend and design mitigations. Broad knowledge of Unix, Linux, Windows and mainframe server environments. Knowledge of various database platforms. Strong knowledge of best practice processes and technologies across security domains especially related to identity and access management, network security, logging and monitoring. Knowledge of at least one cloud services platform (Amazon Web Services, Microsoft Azure, Google Cloud or Oracle Cloud) Education / Experience: Security, compliance, audit or risk covering a wide area of technologies and security domains including those previously mentioned. Financial industry or highly regulated industry background (Insurance, Banking, etc.) Project work experience with a recognized security, audit, or risk consulting firm a plus CISSP, CISA, CISM or other security/control certifications a plus. Bachelors degree or higher – preferably in Computer Science, Engineering, or a related scientific fields Communication Excellent verbal and written communication skills Ability to develop and QA/oversee development of high quality project artifacts Ability to collaborate, influence and communicate successfully in different ways concisely to different audiences (i.e., in business terms to business people, in technical terms to technical people) Able to develop and present dashboards Engagement Proven ability to engage with customers (IT and Business) and consultants in a highly professional and competent manner. Understanding and experience with project life cycles using proven methodologies – from analysis through implementation with hands-on deliverable development. Ability to work in a matrix reporting environment A practiced ability to influence peers, customers and project teams to make security minded decisions and changes Ability to scope projects, developing project charters, requirements, documenting issues and work plans, vendor selection, product/process design and implementation, change management/communication a plus.
Posted 1 month ago
5.0 - 10.0 years
5 - 14 Lacs
Chennai
Work from Office
Provide technical support for internal employees Educate end-users on how to get the most out of their technology Use system monitoring tools for potential performance issues. Perform device provisioning, desktop imaging, and software installation.
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
32455 Jobs | Dublin
Wipro
16590 Jobs | Bengaluru
EY
11025 Jobs | London
Accenture in India
10991 Jobs | Dublin 2
Amazon
8878 Jobs | Seattle,WA
Uplers
8715 Jobs | Ahmedabad
IBM
8204 Jobs | Armonk
Oracle
7750 Jobs | Redwood City
Capgemini
6181 Jobs | Paris,France
Muthoot FinCorp (MFL)
6170 Jobs | New Delhi