Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 10.0 years
7 - 12 Lacs
Bengaluru
Work from Office
RDQ326R15 We are looking for experienced Incident Handlers with cross functional skills, domain expertise and communication skills. Our mission is to respond to security threats, incidents and investigations to protect our customers, employees and enterprise data in a fast, efficient and standardized manner. You will report to the Head of Incident Response in the Security Org. You will be responsible for leading incidents, investigations and security initiatives from postmortems in the EMEA or APAC timezone. You will be a security multiplier and help the team improve security incident handling at Databricks. The impact you will have: You will run Security & Privacy Investigations which will require you to engage with different stakeholders and communicate investigations to Security leadership and work towards incident resolution. Respond to new incidents as part of a distributed daytime operations and on-call schedule. Handle SEV-1s and SEV-0s independently, potentially with leadership support for SEV-0s. You can guide investigations with multiple teams across multiple organizations, to gain traction and tradeoff to resolve issues. You can handle incomplete incident context, and choose best solutions with limited or incomplete information. Partner and build relationships with Engineering and Security teams to contain and mitigate risks during incidents Lead blameless incident postmortems and identify root causes, including systemic issues. Identify, get commitment for, and follow up on projects identified in the postmortem process. What we look for: Strong oral and written communication skills, customer centric attitude and ability to work in a culturally diverse environment. 5+ years of experience in Incident Management Systems or certifications like CISM,GSEC, CISSP or PMP. Program management skills, including prioritization and dealing with ambiguous requirements. You have experience to balance short term/ tactical follow ups and track long term improvements across multiple teams. Experience with technical concepts of cloud security, data ecosystem and the Incident Response process lifecycle. Understand industry wide security terms and models : NIST,ISO/IEC 27001, OWASP, MITRE ATT&CK for Cloud Enterprise. Proven ability to build relationships and propel momentum with clients and stakeholders Benefits At Databricks, we strive to provide comprehensive benefits and perks that meet the needs of all of our employees. For specific details on the benefits offered in your region, please visit https: / / www.mybenefitsnow.com / databricks . About Databricks Databricks is the data and AI company. More than 10,000 organizations worldwide including Comcast, Cond Nast, Grammarly, and over 50% of the Fortune 500 rely on the Databricks Data Intelligence Platform to unify and democratize data, analytics and AI. Databricks is headquartered in San Francisco, with offices around the globe and was founded by the original creators of Lakehouse, Apache Spark , Delta Lake and MLflow. To learn more, follow Databricks on Twitter , LinkedIn and Facebook . Benefits At Databricks, we strive to provide comprehensive benefits and perks that meet the needs of all of our employees. For specific details on the benefits offered in your region, please visit https: / / www.mybenefitsnow.com / databricks . Our Commitment to Diversity and Inclusion . Compliance If access to export-controlled technology or source code is required for performance of job duties, it is within Employers discretion whether to apply for a U.S. government license for such positions, and Employer may decline to proceed with an applicant on this basis alone.
Posted 12 hours ago
15.0 - 20.0 years
50 - 60 Lacs
Bengaluru
Work from Office
No. of Positions 01 Education Bachelor s degree in Information Technology, Computer Science, or a related field. A Master s degree or MBA is preferred. Experience At least 15 years of progressive experience in IT management, with at least five years in a senior leadership role (e.g., CTO, VP of IT). Job Overview The primary focus of this role will be to manage the internal IT infrastructure, systems, and operations of the organization. The role involves managing and optimising the company s information systems to facilitate business processes and operations. It is essential to ensure that technology aligns with the organization s objectives, enhances operational efficiency, and plays a key role in minimizing potential risks, thereby ensuring the company s stability and security. Job Responsibilities The Chief Information Officer (CIO) is responsible for supervising the IT strategy and operations within the organisation. The CIO plays a crucial role in ensuring that IT initiatives align with the business objectives, facilitating efficient operations, and bolstering the organisation s competitive standing. Moreover, the CIO provides leadership to the IT department, oversees technology investments, and ensures the implementation of robust cybersecurity measures. Technology Strategy & Leadership: Develop and implement a comprehensive technology strategy aligned with the organisation s business goals. Provide leadership and direction for the IT department, ensuring that all initiatives align with the company s overall strategy. Stay updated on emerging technologies and assess their potential impact on the organisation. IT Operations Management: Oversee the day-to-day operations of the IT department, ensuring efficient and reliable systems. Manage IT infrastructure, including networks, servers, and enterprise applications. Please make sure the availability, reliability, and performance of IT systems to meet business needs. Cybersecurity & Risk Management: Develop and implement a cybersecurity strategy to protect the organisation s data and systems. Ensure compliance with relevant regulations and industry standards. Lead risk management efforts related to IT, including disaster recovery planning and business continuity. Budget & Resource Management: Develop and manage the IT budget, ensuring cost-effective investments in technology. Oversee vendor relationships, negotiate contracts, and manage service agreements. Ensure the efficient allocation and use of IT resources. Team Development & Leadership: Recruit, develop, and retain top IT talent. Foster a culture of innovation, collaboration, and continuous improvement within the IT team. Provide mentorship and leadership to IT staff, promoting professional growth. Stakeholder Engagement & Communication: Collaborate with other executives to understand and translate business needs into IT initiatives. Communicate technology strategies and initiatives to stakeholders, including the board of directors and senior management. Serve as a liaison between IT and other departments to ensure alignment and support. Desired Skills Certifications: Relevant certifications such as CISSP, CISM, or PMP are a plus. Strong understanding of IT infrastructure, systems architecture, and enterprise applications. Proven experience in developing and implementing technology strategies that align with business objectives. Deep knowledge of cybersecurity principles, risk management, and regulatory compliance. Excellent leadership, communication, and interpersonal skills. Ability to manage complex projects and drive change in a dynamic environment. Strong financial acumen and experience managing large budgets.
Posted 13 hours ago
4.0 - 9.0 years
20 - 25 Lacs
Noida, Gurugram, Coimbatore
Work from Office
Your role We are looking for an experienced Cloud Security Consultant/Lead/Architect with expertise in Azure /AWS to join our team with 4+ years of experience . If you are passionate about cloud security and have hands-on experience with CNAPP tools and Microsoft Azure environments, wed love to hear from you. Manage, update, and enhance security policies across various cloud assets in Microsoft Azure. Improve and optimize security configurations within CNAPP tools in alignment with the customers ISMS (Information Security Management System). Provide expert-level knowledge of Microsoft CNAPP, cloud security frameworks, and integration with SOC tools. Support cloud analysts in alert analysis, remediation planning, and incident response. Assist team leads in preparing weekly and monthly security reports. Ensure continuous monitoring and compliance using CSPM, CWPP, and CASB tools. Collaborate with cross-functional teams to maintain a secure cloud infrastructure. Maintain documentation and audit trails for security configurations and changes. Recommend and implement security best practices for cloud-native applications. Utilize Office 365 tools (Excel, Word, PowerPoint) for reporting and documentation. Your profile Azure/AWS Cloud Security CSPM (Cloud Security Posture Management) / CWPP(Cloud Workload Protection Platform) CASB (Cloud Access Security Broker) / Microsoft CNAPP(Cloud-Native Application Protection Platform) Integration withSOC Tools Cloud Security Monitoring & Reporting What you"ll love about working here You can shape yourcareerwith us. We offer a range of career paths and internal opportunities within Capgemini group. You will also get personalized career guidance from our leaders. You will get comprehensive wellness benefits including health checks, telemedicine, insurance with top-ups, elder care, partner coverage or new parent support via flexible work. At Capgemini, you can work on cutting-edge projectsin tech and engineering with industry leaders or createsolutionsto overcome societal and environmental challenges. Location - Coimbatore,Gurugram,Noida,Chennai,Mumbai,Pune,Hyderabad,Bengaluru
Posted 13 hours ago
5.0 - 8.0 years
12 - 16 Lacs
Kolkata
Work from Office
Line of Service Advisory Industry/Sector Not Applicable Specialism Operations Management Level Senior Associate Job Description & Summary At PwC, our people in business application consulting specialise in consulting services for a variety of business applications, helping clients optimise operational efficiency. These individuals analyse client needs, implement software solutions, and provide training and support for seamless integration and utilisation of business applications, enabling clients to achieve their strategic objectives. As a business application consulting generalist at PwC, you will provide consulting services for a wide range of business applications. You will leverage a broad understanding of various software solutions to assist clients in optimising operational efficiency through analysis, implementation, training, and support. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. Job Description & Summary: We are looking for an experienced Cloud Security Lead with deep technical expertise in Zscaler (ZIA/ZPA) and Fortinet security solutions. The ideal candidate will play a key role in architecting, implementing, and managing secure cloud on-prem and internet access strategies, supporting enterprise-wide digital transformation and security posture enhancement. Responsibilities: Zscaler Security Operations Design, implement, and manage Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) solutions. Configure SIPA (Secure Internet & Private Access) policies for optimized secure remote and internet access. Perform regular reviews, audits, and optimization of Zscaler configurations to align with industry best practices. Provide technical support and guidance to L1 and L2 teams for Zscaler-related issues. Stay up to date on Zscaler enhancements, threat intelligence, and security features to ensure proactive defense. Fortinet and Network Security Implement and manage Fortinet firewall and security solutions for perimeter and cloud-based infrastructure. Configure Fortinet firewalls to support SD-WAN, secure edge, and hybrid cloud environments. Work closely with networking teams to design secure network topologies integrating Fortinet technologies. Cloud Security and Compliance Design and assess cloud-native security architectures for AWS, Azure, or GCP environments. Conduct cloud security assessments, vulnerability scans, and risk remediation. Align security strategies with industry standards like ISO 27001:2022, SOC 2, HIPAA, GDPR, and CIS v3.0.0. Assist in external security audits and privacy assessments related to cloud workloads. Collaboration and Strategy Collaborate with cross-functional teams (Security, IT, DevOps, Engineering) to embed security into cloud and network initiatives. Act as a Subject Matter Expert (SME) for Zscaler and Fortinet technologies in solution design and customer engagements. Maintain documentation on security controls, configurations, SOPs, and incident response playbooks. Required Skills and Qualifications: Experience in network and cloud security domains. Proven hands-on experience with Zscaler ZIA/ZPA design, implementation, and operations. Strong working knowledge of Fortinet firewalls and FortiManager, FortiAnalyzer. Experience with SD-WAN, SDN, VPNs, and secure web gateway technologies. Strong understanding of network security principles, SIEM, threat intelligence, and incident response. Knowledge of cloud compliance standards and risk frameworks (NIST, CIS, ISO). Excellent communication skills and ability to work in cross-functional environments. Strong documentation, presentation, and stakeholder management skills. Experience in SOC environment will be a plus Mandatory skill sets: Zscaler ZIA / ZPA / SIPA Fortinet FortiGate / FortiManager / FortiAnalyzer SIEM platforms (Splunk, QRadar, etc.) Firewall platforms: Fortinet, Palo Alto, Check Point, Juniper Security Frameworks: ISO 27001, NIST, CIS Controls, HIPAA, GDPR Preferred skill sets: Zscaler Certified Professional - ZIA/ZPA Fortinet Certified Professional (FCP) CISSP / CCSP / CISM Cloud Security certifications (AWS/Azure/GCP Security Specialty) Years of experience required: 5-8 Years of experience Education qualification: Graduate Engineer or Management Graduate Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Master Degree, Bachelor Degree Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills Splunk Administration Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Analytical Reasoning, Analytical Thinking, Application Software, Business Data Analytics, Business Management, Business Technology, Business Transformation, Communication, Creativity, Documentation Development, Embracing Change, Emotional Regulation, Empathy, Implementation Research, Implementation Support, Implementing Technology, Inclusion, Intellectual Curiosity, Learning Agility, Optimism, Performance Assessment, Performance Management Software {+ 16 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Available for Work Visa Sponsorship Government Clearance Required Job Posting End Date
Posted 13 hours ago
3.0 - 6.0 years
5 - 9 Lacs
Gurugram
Work from Office
Job Description: GRC AEM(Assessment & Exception Management) Skill set -> 3.5-6 years of experience working in Global Risk and Compliance domain. Required Qualifications Degree in computer science, engineering, IT or equivalent technical degree. Certification preferred: ISO - 27001, CISA and CISM. Preferred Qualifications In-depth knowledge with at least 3-5 years of experience working Global Risk and Compliance domain. Strong communication skills working with users across globe on Information Security best practices exception, assessments and audit modules. ISO-27001, CISA, CISM certifications a plus. o Working shift -> 4:45pm to 1:15am At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We re committed to fostering an inclusive environment where everyone can thrive. Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .
Posted 13 hours ago
4.0 - 6.0 years
4 - 8 Lacs
Gurugram
Work from Office
Work Flexibility: Hybrid What You will do: Administer user access and authorization within SAP or JDE systems. Implement and uphold security policies and guidelines for SAP environments. Conduct regular security audits and assess vulnerabilities in the systems. Investigate and respond to security incidents, collaborating with IT and security teams. Stay informed on SAP or JDE security trends and recommend necessary enhancements. Maintain documentation of security configurations and provide training on best practices. What You will Need: Bachelors degree in Computer Science, Information Security, or a related field. 4 to 6 years of experience in SAP/JDE security administration, ideally within a complex enterprise setting Excellent problem-solving skills to analyze complex security issues. Proficiency in SAP or JDE security best practices. Experience with security audits and vulnerability assessments. Knowledge of compliance standards such as GDPR and SOX . Professional certifications in JDE security administration (e.g., Oracle Certified Professional) and/or cybersecurity (e.g., CISSP, CISM) are a plus. Travel Percentage: 10%
Posted 13 hours ago
8.0 - 13.0 years
15 - 30 Lacs
Bengaluru
Remote
Lead security architecture and GRC initiatives across IT, OT, cloud, and hybrid environments. Perform risk assessments, enforce security standards, and integrate controls across platforms (Cisco, Palo Alto, AWS, Azure). Required Candidate profile 8–15+ yrs experience with NIST, ISO, CIS; scripting; cloud security. Relevant certs: CISSP, CCSP, SABSA, CCIE, PCNSE, AWS/Azure Security.
Posted 14 hours ago
9.0 - 14.0 years
20 - 25 Lacs
Pune
Work from Office
Are you passionate about integrating complex software systems and troubleshooting technical issuesDo you want to contribute to the development and evolution of strategic platformsAre you motivated to work in a complex, global environment where ideas are valued, and effort is appreciated We are looking for an Integration Engineer to join our team and help us to: integrate Attribute Based Access Control software with various Credit Suisse (CS) and UBS systems (Active Directory, Entitlement System, Data Catalogue, etc) (35%) troubleshoot software issues at Level 3, collaborating with internal teams, vendors, and other CS/UBS teams (network, cloud, security, IT on business side) (25%) conduct research and hands-on learning with different technologies (DBs, Cloud services, Application Solutions) across on-prem, Azure, and SaaS (25%) prepare and automate upgrades of vendor software on platforms like Azure Kubernetes Services and OpenShift (5%) prepare and automate building software and necessary elements (rpm, msi, ARM/Terraform) for test environments (Azure cloud, Linux/Windows/Citrix servers) (5%) improve and maintain CI/CD pipelines (GitLab, Azure DevOps pipelines, Jenkins) (5%) You will join a dynamic team responsible for integrating and maintaining complex software systems. Our team collaborates with various departments and technical teams worldwide, ensuring seamless integration and high-quality solutions. We work during standard European hours and focus on delivering secure, available, and high-performance solutions. ideally 8+ years of experience in IT, preferably in an enterprise or corporate environment experience with Continuous Integration (CI) and Continuous Deployment CD understanding of information security concepts (Data Protection, DLP, IRM, Identity and Access Management, Cryptography) both on-prem and in the cloud familiarity with Data Protection, Data Scanning, and Data Catalogue products and technologies experience in designing and engineering new IT services at scale experience in global rollout of new enterprise-wide services and integration of vendor products experience working with regulatory requirements (eg, GDPR, FINMA, MAS) security certifications such as CISSP, CISA, CSSLP, CISM, CCSP
Posted 14 hours ago
8.0 - 13.0 years
7 - 8 Lacs
Pune
Work from Office
Required Skills Technology | Sentinel SIEM Tool Administrator | Level 2 Support Technology | Securonix SIEM Tools Administrator | Level 2 Support Technology | ArcSight SIEM Tools Administrator | Level 2 Support Technology | Network Security Administrator | Level 2 Support Education Qualification : B.Sc Certification Mandatory / Desirable : Technology | Microsoft Certified: Security, Compliance, and Identity Fundamentals / CISSP/CISM/CEH/GIAC Certified Incident Handler/Certified SOC Analyst (CSA)/CompTIA Cybersecurity Analyst (CySA+)/Cisco Certified CyberOps Associate Delivery Skills required are: - Technical Skills: - *Identifying and analyzing potential threats and vulnerabilities using various tools and techniques. *Leading and managing the response to security incidents, including containment, eradication, and recovery. *Implementing and maintaining security monitoring systems, such as SIEM (Security Information and Event Management) tools. *Prioritizing and remediating vulnerabilities based on risk assessments. Operational Skills: - *Developing, implementing, and enforcing security policies, standards, and procedures. *Managing and maintaining secure configurations for systems, networks, and applications. *Overseeing the timely application of security patches and updates to systems and software. Analytical Skills: - *Analyzing logs and event data from various sources to identify patterns and anomalies. *Utilizing advanced analytics to detect and investigate security incidents. *Conducting digital forensics investigations to uncover evidence of security breaches. Collaboration and Teamwork: - *Collaborating with other IT and security teams to enhance the organization s security posture. *Coordinating response efforts during security incidents with internal and external stakeholders. *Leading incident response teams and ensuring effective communication and collaboration.
Posted 14 hours ago
1.0 - 3.0 years
3 - 5 Lacs
Bengaluru
Work from Office
The Global Information Security (GIS) Technology Risk Management Analyst will work with peers in Global Information Security (GIS) and across the Technology Division to ensure that third party technology risks are properly identified, assessed, monitored, and communicated in support of the overall Third Party Risk Management (TPRM) program. The Analyst will assist with the continuous improvement and daily operation of the GIS Third Party Risk Management (GIS TPRM) program. Responsibilities Include: Work with peers to identify and assess Information Security risks Conduct risk assessments using CME Groups established GIS Third Party Risk Management assessment process Collaboratively author and edit various assessment related documents including Deficiencies Observed, Summary of Work, Risk Advisory Memos, exceptions from GIS technical policies and standards, and other related output resulting from risk adjudication activities Participate in and contribute to various working groups across the Technology Division, including, but not limited to, Third Party Risk Management working group, Governance, Risk Management, and Compliance (GRC) working group, etc. Assist the GIS TPRM function with: Continuous improvement and maturation of the methods, instrumentation, training, documentation, and processes required to properly manage third party technology risks Providing advisory and consulting services to the Information Technology Management Team related to InfoSec risks, treatment strategies, and decision-making Assist in the preparation of management reports, presentations, metrics, and other documentation required to support governance functions Assist in compiling and delivering business and operational metrics at regular intervals Promoting a culture of risk awareness and accountability through training, education, and risk management consultative support Problem Solving: Objectively assess the impact, likelihood, and velocity of identified risks Objectively advise on any number of controls that will mitigate risk while not imposing undue burden on those who must implement the controls Drive objectivity and build consensus among stakeholders with widely divergent perspectives and drivers Rapidly analyze complex technical details Synthesize detailed analysis into a big picture view that can be easily understood by non-technical stakeholders in order to support risk-based decision-making for senior managers within the company Decision Making: Recommend risk treatment decisions Recommend remediation actions when risk mitigation is desired Recommend improvements to methods, instrumentation, training, documentation, and processes Recommend solutions for automating and streamlining GIS TPRM risk management practices Working Relationships: Interacts with peers across all elements of the Technology Division Communicate regularly with cross-functional peers outside of the Technology Division, including Legal, Information Governance, Global Operations, Global Assurance (Internal Audit), Enterprise Risk Management, Third Party Risk Management, and other business unit leadership Interact occasionally with industry peers from other Systemically Important Financial MarketUtilities(SIFMUs),research organizations, solution providers, etc. Required Experience: Bachelors Degree or equivalent experience Minimum of 1 to 3 years of relevant experience in publicly traded companies or finance/technology industry operations with third party risk management experience a plus Experience in at least two of the following: InfoSec (Operations, Program Management, Governance, Risk Management, etc.), Enterprise Architecture, Identity & Access Management, Application Development, Infrastructure & Operations, IT Compliance, or Internal Audit Experience working with industry based information security and / or control frameworks (NIST Cyber Security Framework, ISO 27002, COBIT, etc.) Demonstrable knowledge of a broad range of InfoSec technologies and practices Demonstrable, impeccable writing skills for technical, management, and executive audiences Additional preferred experience: Demonstrable knowledge of InfoSec risk management methods and practices Experience with operating GRC solutions Professional certification in InfoSec or Risk Management (such as CRISC, CISM, CISSP, CGEIT, CISA, etc.)
Posted 14 hours ago
10.0 - 15.0 years
22 - 37 Lacs
Pune, Bengaluru, Mumbai (All Areas)
Hybrid
Job Title: Senior Manager Information/Cyber Security Job Location: Pune / Bangalore / Mumbai Job Summary: We are looking for a seasoned professional in Information/Cyber Security to be part of the Digital Trust and Security team at Capgemini Invent This role requires a resource who is experienced in managing client-facing cybersecurity programs, providing strategic advisory, and enhancing security capabilities within the organization. Key Responsibilities: Client Advisory & Leadership: Lead cybersecurity engagements for clients, and providing strategic direction and ensuring alignment with their business and security goals. Program Oversight: Manage the delivery of multiple cybersecurity projects, ensuring high-quality service, timely execution, and compliance with client expectations. Risk Management & Compliance: Oversee risk assessments for clients and ensure the implementation of security controls that meet industry standards (ISO 27001, NIST, GDPR, etc.). Team Development: Mentor and develop the internal cybersecurity team, fostering a culture of continuous improvement and ensuring the team is equipped to handle evolving client needs. Stakeholder Engagement: Collaborate with senior client stakeholders, including C-level executives, to communicate security risks, program progress, and recommend improvements. Innovation & Thought Leadership: Drive the adoption of new security technologies and best practices, positioning the organization as a thought leader in cybersecurity services. Business Development & Solutioning: Lead the development of cybersecurity solutions tailored to client needs, aligning with emerging threats and industry trends. Collaborate with sales and account teams to identify new business opportunities and expand client relationships through cybersecurity offerings. Develop and present compelling proposals, including RFP/RFI responses, for cybersecurity services. Engage in pre-sales activities, providing expertise and thought leadership to support business development efforts. Drive solution architecture and proposal strategies for large-scale cybersecurity projects to win new business. Required Skills and Qualifications: Master’s degree in Information security, Cybersecurity, Information Technology , or a related field. 10-15 years of experience in Information/Cybersecurity , with at least 7 years in a client-facing leadership role within a consulting environment. Deep understanding of cybersecurity frameworks (e.g., ISO 27001, NIST etc.) and regulatory standards (GDPR, HIPAA, PCI-DSS etc.). Proven track record in managing complex security programs for large clients, including risk management, cloud security, incident response , and compliance management . Certifications such as CISSP, CISM, CRISC, CISA, or PMP are highly preferred. Personal Attributes: Strong leadership and team-building skills, with a focus on mentoring and developing the next generation of cybersecurity leaders. Excellent communication and presentation skills, with the ability to influence senior stakeholders at client organizations.
Posted 15 hours ago
3.0 - 6.0 years
7 - 16 Lacs
Mohali
Remote
Cybersecurity Engineer + Analyst (Hybrid Chandigarh / Mohali) Infinity Healthcare Solutions, LLC is expanding its cybersecurity operations and is actively seeking a highly skilled and motivated Cybersecurity Engineer + Analyst to join our team. This role is designed for professionals who bring both deep technical engineering expertise and analytical skills to secure enterprise infrastructure, identify vulnerabilities, and respond to evolving cyber threats. This position will work at the intersection of IT security architecture, incident response, risk management, and compliance operations to ensure the security and integrity of our organizations data and systems. Key Responsibilities: Security Operations & Monitoring: Monitor infrastructure, networks, and cloud environments using SIEM tools (e.g., Splunk, Microsoft Sentinel) Identify, investigate, and respond to real-time alerts and security incidents Analyze logs and network traffic to detect anomalies and unauthorized activities Perform deep-dive forensic analysis and root cause investigations on security events Incident Response & Threat Management Lead and execute end-to-end incident response processes including containment, eradication, and recovery Maintain incident response playbooks, runbooks, and documentation for various threat scenarios Collaborate with cross-functional teams to remediate vulnerabilities and improve incident readiness Stay up to date with the latest threats, vulnerabilities, zero-day exploits, and malware campaigns Security Engineering & Hardening Manage and configure endpoint protection, firewalls, IDS/IPS, and other security controls Assist in the secure deployment and configuration of cloud environments (AWS, Azure, GCP) Evaluate and implement security tools and automation for risk mitigation Apply industry best practices to harden systems and reduce attack surfaces Governance, Risk & Compliance Perform routine risk assessments, internal security audits, and gap analysis Ensure adherence to regulatory and compliance standards: ISO 27001, NIST, SOC 2, GDPR Support internal and external audits by preparing documentation and evidence Develop and maintain security policies, procedures, and technical documentation IAM & Access Controls Manage Identity and Access Management (IAM), including user provisioning, role-based access, MFA Enforce least privilege and zero-trust principles across all systems and environments Required Qualifications: Bachelors degree in Cybersecurity, Computer Science, Information Technology, or a related field Minimum 3 years of hands-on experience in cybersecurity operations, security engineering, or threat analysis Proficient with SIEM, IDS/IPS, EDR, antivirus, and endpoint security platforms Solid understanding of network protocols, firewalls, routing, and segmentation Practical knowledge of security for cloud platforms (AWS, Azure, or GCP) Experience working with IAM, RBAC, MFA, VPNs, and secure access controls Strong documentation and reporting skills; ability to communicate technical issues clearly Preferred Skills & Tools: Familiarity with MITRE ATT&CK, CIS Controls, OWASP Top 10 Experience using tools such as Wireshark, Nmap, Nessus, CrowdStrike, Qualys Scripting or automation experience (e.g., PowerShell, Python, Bash) is a plus Familiarity with DevSecOps practices is desirable Preferred Certifications (Any): CEH Certified Ethical Hacker CompTIA Security+ CISSP Certified Information Systems Security Professional CISA, CISM, or other GIAC certifications Why Join Us: Opportunity to work in a security-first environment with global impact Collaborative, forward-thinking team culture Exposure to enterprise-grade cloud security architecture and compliance frameworks Career development.
Posted 17 hours ago
5.0 - 9.0 years
5 - 7 Lacs
Mumbai, Navi Mumbai
Work from Office
Implement security strategy, policies & controls.Oversee risk, vendor security, BCDR, vulnerability remediation & AppSec.Drive compliance, training,audits,and continuous improvement.GRC tool expertise,ISO27001 Implementer/Auditor,CGRC/BCMS preferred.
Posted 20 hours ago
8.0 - 12.0 years
0 Lacs
chennai, tamil nadu
On-site
As a Security Architect & Engineer, you will play a crucial role in designing secure architectures, implementing effective security controls, and supporting security operations across IT and cloud environments. Your responsibilities will involve creating long-term security strategies aligned with business goals, evaluating security technologies, and ensuring compliance with regulatory requirements. In the realm of Security Architecture, you will be tasked with designing secure and scalable architectures that seamlessly integrate with existing IT systems. Your role will also involve recommending security technologies, frameworks, and practices across IT, OT, and cloud environments. Implementing access control and identity management measures will be essential, including least privilege, RBAC, MFA, and SSO controls. In terms of Security Engineering, you will apply secure configuration baselines and automation across operating systems, databases, and cloud environments. Supporting security and vulnerability assessments, assisting in patch implementations, and promoting infrastructure-as-code and DevSecOps practices will also fall under your purview. Your involvement in Security Operations will require collaboration with SOC and IT teams to detect, investigate, and respond to security incidents. To enhance security measures, you will support threat hunting, root cause analysis, and the evolution of incident response and disaster recovery plans. Regarding Risk, Compliance & Governance, you will be responsible for identifying and mitigating security risks associated with IT systems. Developing security policies, conducting risk assessments, ensuring compliance with frameworks and regulations, and providing security input into vendor assessments will be crucial aspects of your role. In terms of Collaboration & Communication, you will act as a trusted advisor to internal teams on security best practices and secure solution design. Your ability to translate complex security topics into actionable guidance for technical and business stakeholders will be paramount. To qualify for this role, you should hold a Bachelor's degree in Information Security, Computer Science, or a related field, along with 8-12 years of cybersecurity experience. Strong knowledge of cloud security services, regulatory compliance requirements, IAM concepts, and relevant certifications are required. Additionally, experience with SIEM, EDR, vulnerability scanners, and cloud-native controls is essential. While not mandatory, advanced knowledge in cloud security architecture, experience with automation tools, and relevant certifications like CISSP, CISM, or CEH would be advantageous. This position may offer remote work options and will involve collaboration with diverse teams in a dynamic environment, providing you with the opportunity to contribute to critical security initiatives.,
Posted 23 hours ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
As a candidate for this position, you will be responsible for performing and documenting testing on consulting, compliance, and internal audit engagements with a focus on IT risk, strategy, and governance within financial institutions. You will also provide training and supervision for engagement staff, identify findings, and document opportunities for process improvement. Additionally, you will research technical issues that arise during engagements and assist Managers and/or Senior Managers in developing strategic solutions to meet client needs. Furthermore, you will work closely with Managers and/or Senior Managers on engagement planning, execution, and issuing a final report that meets client deadlines. You will also play a key role in setting the foundation for developing relationships with clients through networking and business development activities. Your motivation to meet client deadlines and provide excellent client service will be crucial to your success in this role. In terms of qualifications, a Bachelor's degree is required for this position. Preferred certifications include CISA, CISM, or CISSP. If not already certified, you must meet the educational requirements to obtain a license upon hire in the state of employment. Additional certifications such as CPA, CIA, CRCM, CAMS, CFIRS, CFE, and/or CFF are considered a plus. The ideal candidate will have a minimum of 3 years of experience in information systems, internal audit, regulatory compliance, or consulting services. Experience in network engineering/administration with a security emphasis is preferred. Knowledge of IT control and/or services management standards such as CObIT, ITIL, and ISO is also preferred. Previous experience in banking or credit unions would be advantageous. You should possess the ability to work effectively as part of a team as well as independently. Creative problem-solving and research skills are essential, along with excellent verbal and written communication abilities. Strong analytical and report writing skills are required, and proficiency with Microsoft Office applications such as Word, Excel, PowerPoint, and Outlook is expected. The ability to handle multiple priorities, tasks, and simultaneous projects is a key attribute for success in this role.,
Posted 1 day ago
8.0 - 12.0 years
0 Lacs
haryana
On-site
As a Cyber Risk Manager at Stryker, your primary role will be to identify, analyze, evaluate, and mitigate present and future risks to Stryker data and assets. You will drive towards acceptable risk levels by fostering partnerships with IT, Business, and Partner stakeholders. Your responsibilities will encompass a broad spectrum of tasks within Stryker, focusing on managing and completing reviews throughout the cyber risk management lifecycle. Your essential duties and responsibilities will include leading and overseeing 3rd party cyber security assessments of vendors and other external parties engaging with Stryker. You will also drive the completion of cyber risk assessments across various functions, proactively identifying opportunities to minimize risk levels. By engaging with stakeholders and leveraging internal partnerships, you will work towards maintaining acceptable risk levels for the organization. In addition, you will be responsible for leading the design, implementation, maintenance, and enforcement of cyber risk management policies, procedures, and controls. Utilizing tools such as ServiceNow and OneTrust, you will streamline and enhance risk assessment activities. It will be crucial for you to identify key program metrics, such as key performance indicators (KPI) and key risk indicators (KRI), to gauge the effectiveness of the program and assess inherent risks to the organization. Continuous improvement of the cyber risk assessment process will also be a key focus, from request intakes to evidence gathering. To qualify for this role, you should hold a Bachelor's degree in computer information systems, Information Security, or a related field. A Master's degree is preferred. Additionally, having an understanding of various Cyber Security Risk Frameworks like NIST 800-300 and ISO 27001, along with relevant industry certifications such as CRISC, CISM, or CISSP, will be advantageous. With at least 8 years of experience in a regulated industry, strong negotiation and leadership skills are essential for this role. You should have the ability to influence and lead teams effectively, communicate proficiently, and work independently under minimal supervision. Thriving in a fast-paced environment, managing global teams, and familiarity with tools like OneTrust will be beneficial. As a Cyber Risk Manager at Stryker, you will be expected to be a results-oriented leader with the ability to drive change, collaborate effectively, and communicate across all levels of the organization. Your strategic agility, high energy, and focus on process and metrics will play a crucial role in successfully managing cyber risks and driving positive outcomes for the organization.,
Posted 1 day ago
3.0 - 7.0 years
0 Lacs
pune, maharashtra
On-site
MECPL is a construction company specializing in Civil, Structural & Interior Contracts. We focus on delighting clients by consistently meeting requirements and exceeding expectations through Quality Construction, Timely completion, and After Sales Service of Industrial, Commercial & Institutional Projects. Our use of state-of-the-art technology and commitment to quality construction keeps us at the forefront of the industry. This is a full-time on-site Information Technology Security role located in Pune at MECPL. The role involves implementing cybersecurity measures, ensuring network security, managing information security, and overseeing application security on a day-to-day basis. You will lead the organization's cybersecurity posture and ensure the safe deployment and operation of cloud platforms, SaaS apps, and user identity systems. Key Responsibilities: - Implement firewalls, MFA, endpoint detection (EDR/XDR) - Ensure Email security: SPF, DKIM, DMARC; spam/phishing protection - Monitor threats, audit logs, VPN, and remote access policies - Maintain Microsoft 365 / Google Workspace security configuration - Oversee Cloud workload security (if using AWS, Azure, GCP) Must-Have Skills: - CISSP/CEH/CISM preferred or equivalent experience - Knowledge of SIEM tools, endpoint security (CrowdStrike, SentinelOne) - Familiarity with Microsoft Intune, Google Admin Console, Okta/Azure AD Qualifications: - Cybersecurity, Network Security, and Information Security skills - Experience in Information Technology and Application Security - Strong understanding of security principles and best practices - Certifications like CISSP, CISM, or CISA are a plus - Bachelor's degree in Computer Science, Information Technology, or a related field - Relevant work experience in IT security roles,
Posted 1 day ago
3.0 - 7.0 years
0 Lacs
noida, uttar pradesh
On-site
As a Technology Transformation Risk Senior at EY, you will be instrumental in ensuring that technology transformations are executed with a thorough understanding and management of associated risks. Your role will involve identifying, assessing, and mitigating risks related to significant technology changes like system upgrades, cloud migrations, and the implementation of new digital tools. By adhering to the company's risk management policies, you will guarantee the secure and compliant implementation of technological advancements. Key Responsibilities: - Conduct risk assessments for technology transformation projects to identify potential risks and vulnerabilities. - Assist in developing and executing risk mitigation strategies to address identified risks. - Collaborate with project teams to incorporate risk considerations throughout the project lifecycle. - Monitor and communicate the status of risk mitigation activities to the Technology Transformation Risk Manager and other stakeholders. - Contribute to the preparation and upkeep of risk documentation, including risk registers, reports, and dashboards. - Participate in the formulation of risk management policies, procedures, and training materials. - Engage with internal and external stakeholders to convey risk findings and recommendations. - Stay abreast of emerging technology trends, threats, and regulatory requirements that could impact the risk landscape. - Support the Technology Transformation Risk Manager in cultivating a culture of risk awareness and proactive risk management within the organization. Qualifications: - Bachelor's degree in Information Technology, Computer Science, Risk Management, or a related field. - At least 3 years of experience in technology risk management, particularly in transformation projects. - Profound knowledge of IT governance frameworks (e.g., COBIT, ITIL), cybersecurity principles, and data privacy regulations (e.g., GDPR, CCPA). - Preferred experience in Internal controls within SAP ECC/S4 Applications, IT application controls, IT general controls, and interface controls. - Professional certifications such as CRISC, CISM, CISSP, or equivalent are highly advantageous. - Demonstrated exposure to client-facing roles and collaboration with cross-functional teams including internal audits, IT security, and business stakeholders to evaluate control effectiveness and facilitate remediation activities. - Excellent communication, documentation, and report writing skills. Join EY to craft a fulfilling career and contribute to building a better working world for all.,
Posted 1 day ago
16.0 - 20.0 years
0 Lacs
chennai, tamil nadu
On-site
You will be responsible for reviewing and approving firewall requests in line with the risk appetite of the organization. Your role will involve reviewing and analyzing firewall rules to ensure their effectiveness and alignment with security best practices. It will be crucial for you to ensure that all firewall rules are recertified by owners within the specified timeframe. In cases where no owner is assigned, you will be required to find an owner and update the necessary information accordingly. Your duties will include performing firewall ruleset reviews and validating rule compliance reports generated from automated firewall review solutions. You will need to collaborate with stakeholders and manage ACL ruleset by adding, updating, removing, and optimizing rules to eliminate defunct or duplicate entries. Adherence to the change management process for creating, modifying, or removing rules with appropriate approvals is essential. Documenting all changes to firewall rules comprehensively is a key aspect of this role. This documentation should include the reason for the change, details of the change, the requestor's information, and the date and time of the change. Regularly reviewing existing firewall rules to ensure their necessity and appropriateness is also part of your responsibilities. Outdated or redundant rules should be identified and removed, while adjustments to rules based on identified issues should be made as necessary. In terms of experience qualifications, you should possess 16 to 20 years of experience in setting up, configuring, and managing firewall devices such as Palo Alto, F5, Zscaler, Cisco ISE, Azure, and DDoS solutions. A strong background in Network Architecture and the ability to design and develop the architecture framework are essential. Experience in preparing High-Level Design (HLD) and Low-Level Design (LLD) documents, managing end-to-end delivery, and excellent communication skills are required. Moreover, you should demonstrate strong leadership and team management skills, along with the ability to collaborate effectively with cross-functional teams. Possessing certifications such as CISSP, Certified Ethical Hacker (CEH), or CISM would be considered advantageous for this role.,
Posted 1 day ago
10.0 - 15.0 years
20 - 30 Lacs
Bengaluru
Hybrid
Role Overview: We are seeking a highly skilled Information Security Specialist to join our team. The ideal candidate will have extensive experience in addressing client queries related to product security, AI security, and cloud security (AWS and Azure) . This role requires a proactive approach to identifying and mitigating security risks , as well as excellent communication skills to effectively interact with clients. Key Responsibilities: Good and detailed understanding of Azure and AWS services provisioning, architecture and security recommendations Respond to client queries regarding product security, AI security, and cloud security (AWS and Azure). Develop and implement security policies, protocols, and procedures. Conduct regular security audits and assessments to identify vulnerabilities. Collaborate with the product development team to ensure security best practices are integrated into the product lifecycle. Monitor and analyze security incidents to determine root causes and implement corrective actions. Stay updated with the latest security trends, threats, and technologies. Provide training and guidance to internal teams on security best practices. Co-ordinate with internal InfoSec team for timely deliverables, as required Hands-On experience for Azure and AWS Cloud services and application end -to-end provisioning on Cloud. Key Performance Indicators (KPIs): Client Query Response Time: Ensure all client queries related to security are addressed within 24 hours. Incident Resolution Time: Resolve security incidents within the defined SLA (Service Level Agreement). Security Audit Compliance: Achieve a compliance rate of 95% or higher in all security audits. Client Satisfaction: Maintain a client satisfaction score of 90% or higher for security-related queries and support. Training Effectiveness: Conduct quarterly security training sessions with an average feedback score of 4.5/5. Cloud Architecture: Ensure secure hosting of product at Cloud Environment. Qualifications: Bachelor's degree in computer science, Information Technology, or a related field. Minimum of 10-15 years of experience in information security, with a focus on AI security and cloud security (AWS and Azure). Relevant certifications such as CISSP, CISM, or AWS Certified Security Specialty. Strong understanding of security frameworks and standards (e.g., ISO 27001,NIST). Excellent problem-solving skills and attention to detail. Strong communication and interpersonal skills. Nice to have Exposure to financial research domain Industry recognized certification programs on Data Management/Cloud etc. » Experience with JIRA, Confluence » Understanding of scrum and Agile methodologies » Experience with data visualization tools, such as Grafana, GGplot, etc. Soft skills » Oral and written communication skills » Good problem solving and negotiation skills » Intellectual curiosity to find new and unusual ways of how to solve data management issues. » Passionate about the work and attention to detail
Posted 1 day ago
2.0 - 5.0 years
2 - 6 Lacs
Bengaluru
Work from Office
Job Title: Information Security Engineer Job Type: Full-Time Position Overview: We are seeking a highly skilled Information Security Engineer to manage Risk Assessment,Compliance, and Clouds Infrastructure Security, with specialized expertise in healthcaresecurity, cybersecurity analytics, and emergency preparedness. The ideal candidate will haveexperience designing secure applications and architectures, conducting SAST/DAST testing,managing cyber emergency preparedness, and ensuring robust security protocols across theenterprise. You will also be responsible for developing security policies and procedures andintegrating cutting- edge security practices to maintain the organization's security posture andcompliance standards. Key Responsibilities: Risk Assessment: Perform internal and third-party risk assessments, conductsecurity audits, and manage vulnerability remediation. Develop mitigation strategiesand report risks to senior management. Clouds Infrastructure Security: Secure cloud environments (AWS, Azure, GCP) and on prem infrastructure, ensuring access controls, encryption, and network securityprotocols are in place. Compliance Management: Oversee compliance with HIPAA, GDPR, DPDPA, and healthcare-specific regulations. Support audit preparation, conduct assessments, andensure alignment with industry and privacy standards. Cybersecurity Analytics: Leverage cybersecurity analytics to monitor, identify, andrespond to threats in real-time, utilizing data-driven insights to enhance overall securityposture. Designing Secure Applications Architectures: Collaborate with development teams todesign and implement secure applications and system architectures, ensuring thatsecurity best practices are incorporated into the software development lifecycle. SAST /DAST: Implement Static and Dynamic Application Security Testing (SAST/DAST) to identify vulnerabilities and ensure secure coding practices throughout the development pipeline. Cyber Emergency Preparedness: Develop and maintain cyber emergency preparednessplans, including incident response, disaster recovery, and business continuity strategies. Electronic Surveillances Corporate Security: Oversee and manage electronic surveillance systems to detect and prevent both physical and cybersecurity threats.Ensure seamless integration between corporate security measures and IT/cybersecurity strategies. Security Policies Procedures: Develop, document, and maintain comprehensive securitypolicies and procedures to ensure regulatory compliance and alignment with riskmanagement frameworks. Incident Response: Lead investigations into security incidents, conduct root cause analysis,and recommend corrective actions to prevent future breaches. Collaboration Training: Partner with IT, development teams, and external vendors tointegrate security best practices into cloud and infrastructure environments. Providetraining and awareness programs to staff on security policies and procedures. Qualifications: 2-5 years of experience in information security, risk management, compliance, and healthcare security. Expertise in cybersecurity analytics, secure application design, andarchitectural security best practices. Strong knowledge of HIPAA, GDPR, DPDPA, and other healthcare-related compliance regulations. Hands-on experience with cloud security (AWS, Azure, GCP) and infrastructure security. Proficiency in SAST/DAST tools and vulnerability management. Experience with cyber emergency preparedness, incident response, anddisaster recovery planning. Knowledge of electronic surveillance systems and corporate security measuresto protect both physical and digital assets. Ability to document and maintain security policies, procedures, and standards. Strong analytical, communication, and problem-solving skills. Certifications (Preferred): CISSP, CISM, CRISC, CEH, AWS Certified Security Specialty, Azure Security Engineer, Certified HIPAA Professional (CHP), Certified Information Privacy Professional(CIPP/US), Certified Business Continuity Professional (CBCP)
Posted 1 day ago
5.0 - 9.0 years
10 - 14 Lacs
Mumbai, Navi Mumbai
Work from Office
ASSOCIATE CONSULTANT Experienced in Information Security Risk Management with experience in implementing and maintaining Risk Management frameworks (ISO 31000 & ISO 27001) Should have executed and managed consulting and audit assignments for clients in the areas such as internal audit, operational risk management and compliance management. Should be adept at conducting gap analysis, risk assessments to identify vulnerabilities. Have worked with organizations to develop Business Continuity Plans and Disaster Recovery related processes. Should be able to understand and explain technical vulnerabilities Basic knowledge on Active directory, firewalls, SCCM, MacAfee security products, DLP, Secure coding practices and product security Should have Knowledge on information security incident management. Specific Duties and Responsibilities Include: Proactively protect the organizations information by ensuring appropriate information security controls are in existence and enforced Conduct audits to verify the compliance to organizations security standards Assist in Business Continuity Planning and Implementation. Metrics collection & reporting Must Have Skills Excellent communication and presentation skills. Able to effectively interact with various functions. Good to have Skills / Certification Minimum: ISO27001:2013 Lead Auditor course Good to have: CISSP, CISA, CISM, ISO22301QualificationBE/ BTech, MCA, MBA with specialization in Information Security #eviden
Posted 1 day ago
4.0 - 8.0 years
10 - 14 Lacs
Mumbai, Navi Mumbai
Work from Office
ASSOCIATE CONSULTANT Experienced in Information Security Risk Management with experience in implementing and maintaining Risk Management frameworks (ISO 31000 & ISO 27001) Should have executed and managed consulting and audit assignments for clients in the areas such as internal audit, operational risk management and compliance management. Should be adept at conducting gap analysis, risk assessments to identify vulnerabilities. Have worked with organizations to develop Business Continuity Plans and Disaster Recovery related processes. Should be able to understand and explain technical vulnerabilities Basic knowledge on Active directory, firewalls, SCCM, MacAfee security products, DLP, Secure coding practices and product security Should have Knowledge on information security incident management. Specific Duties and Responsibilities Include: Proactively protect the organizations information by ensuring appropriate information security controls are in existence and enforced Conduct audits to verify the compliance to organizations security standards Assist in Business Continuity Planning and Implementation. Metrics collection & reporting Must Have Skills Excellent communication and presentation skills. Able to effectively interact with various functions. Good to have Skills / Certification Minimum: ISO27001:2013 Lead Auditor course Good to have: CISSP, CISA, CISM, ISO22301QualificationBE/ BTech, MCA, MBA with specialization in Information Security #eviden
Posted 1 day ago
6.0 - 11.0 years
9 - 14 Lacs
Mumbai
Work from Office
Policy & Framework Management: Define, review, and update cybersecurity policies, procedures, and standards to align with business and regulatory requirements.Regularly review and update Security Configuration Documents (SCDs).Drive the adoption and alignment of the NIST Cybersecurity Framework.Implement and manage the Unified Compliance Framework to streamline regulatory mapping.Security Controls & Automation: Conduct configuration reviews across critical systems and platforms.Lead initiatives to automate policy management and control validation.Evaluate and recommend risk management solutions and security technologies.Risk & Change Management: Perform third-party/vendor risk assessments, including onboarding, periodic review, and offboarding processes.Collaborate with IT and operations teams for firewall rule lifecycle management.Participate in and govern the Change Management process to ensure security reviews and approvals.Compliance & Audit: Ensure continuous compliance with RBI, IRDAI, UIDAI, ISO 27001, IT Act 2000, and other applicable regulatory and industry standards.Prepare, maintain, and manage documentation for internal and external audits.Track, report, and drive mitigation for audit findings and exceptions.Implement and maintain continuous compliance monitoring tools and practices.Reporting & Governance: Develop and report on cybersecurity posture to senior leadership and key stakeholders.Maintain and deliver Service Level Agreements (SLA) reports and performance metrics.Design and manage Key Risk Indicators (KRI) dashboards to support informed decision-making.Conduct periodic exception reviews and manage approval workflows. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Bachelor’s or Master’s degree in Information Security, Computer Science, or a related field.6+ years of experience in cybersecurity governance, risk, and compliance (GRC).Strong understanding of NIST, ISO 27001, UCF, and regulatory standards (RBI, IRDAI, UIDAI, IT Act).Proven experience in policy lifecycle management, audit coordination, and risk assessment.Familiarity with firewall rule governance, change management, and automated compliance tools.Excellent communication, analytical, and stakeholder management skills. Preferred technical and professional experience CISSP, CISM, CRISC, CISA, ISO 27001 Lead Implementer/Auditor, CGEIT
Posted 1 day ago
5.0 - 8.0 years
12 - 16 Lacs
Kolkata
Work from Office
& Summary . Why PWC & Summary We are looking for an experienced Cloud Security Lead with deep technical expertise in Zscaler (ZIA/ZPA) and Fortinet security solutions. The ideal candidate will play a key role in architecting, implementing, and managing secure cloud onprem and internet access strategies, supporting enterprisewide digital transformation and security posture enhancement. s Zscaler Security Operations Design, implement, and manage Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) solutions. Configure SIPA (Secure Internet & Private Access) policies for optimized secure remote and internet access. Perform regular reviews, audits, and optimization of Zscaler configurations to align with industry best practices. Provide technical support and guidance to L1 and L2 teams for Zscalerrelated issues. Stay up to date on Zscaler enhancements, threat intelligence, and security features to ensure proactive defense. Fortinet and Network Security Implement and manage Fortinet firewall and security solutions for perimeter and cloudbased infrastructure. Configure Fortinet firewalls to support SDWAN, secure edge, and hybrid cloud environments. Work closely with networking teams to design secure network topologies integrating Fortinet technologies. Cloud Security and Compliance Design and assess cloudnative security architectures for AWS, Azure, or GCP environments. Conduct cloud security assessments, vulnerability scans, and risk remediation. . Assist in external security audits and privacy assessments related to cloud workloads. Collaboration and Strategy Collaborate with crossfunctional teams (Security, IT, DevOps, Engineering) to embed security into cloud and network initiatives. Act as a Subject Matter Expert (SME) for Zscaler and Fortinet technologies in solution design and customer engagements. Maintain documentation on security controls, configurations, SOPs, and incident response playbooks. Required Skills and Qualifications Experience in network and cloud security domains. Proven handson experience with Zscaler ZIA/ZPA design, implementation, and operations. Strong working knowledge of Fortinet firewalls and FortiManager, FortiAnalyzer. Experience with SDWAN, SDN, VPNs, and secure web gateway technologies. Strong understanding of network security principles, SIEM, threat intelligence, and incident response. Knowledge of cloud compliance standards and risk frameworks (NIST, CIS, ISO). Excellent communication skills and ability to work in crossfunctional environments. Strong documentation, presentation, and stakeholder management skills. Experience in SOC environment will be a plus Mandatory skill sets Zscaler ZIA / ZPA / SIPA Fortinet FortiGate / FortiManager / FortiAnalyzer SIEM platforms (Splunk, QRadar, etc.) Firewall platforms Fortinet, Palo Alto, Check Point, Juniper Security Frameworks ISO 27001, NIST, CIS Controls, HIPAA, GDPR Preferred skill sets Zscaler Certified Professional ZIA/ZPA Fortinet Certified Professional (FCP) CISSP / CCSP / CISM Cloud Security certifications (AWS/Azure/GCP Security Specialty) Years of experience required 58 Years of experience Education qualification Graduate Engineer or Management Graduate Education Degrees/Field of Study required Master Degree, Bachelor Degree Degrees/Field of Study preferred Required Skills Splunk Administration Accepting Feedback, Accepting Feedback, Active Listening, Analytical Reasoning, Analytical Thinking, Application Software, Business Data Analytics, Business Management, Business Technology, Business Transformation, Communication, Creativity, Documentation Development, Embracing Change, Emotional Regulation, Empathy, Implementation Research, Implementation Support, Implementing Technology, Inclusion, Intellectual Curiosity, Learning Agility, Optimism, Performance Assessment, Performance Management Software {+ 16 more} Travel Requirements Available for Work Visa Sponsorship
Posted 1 day ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The demand for Certified Information Security Manager (CISM) professionals is on the rise in India as organizations are focusing more on securing their digital assets. CISM professionals play a crucial role in designing, implementing, and managing information security programs to protect an organization's sensitive data and information systems.
The average salary range for CISM professionals in India varies based on experience and location. Entry-level positions can expect a salary range of INR 6-10 lakhs per annum, while experienced professionals can earn upwards of INR 20 lakhs per annum.
A typical career progression for CISM professionals may include roles such as Information Security Analyst, Information Security Manager, Chief Information Security Officer (CISO), and ultimately, a Senior Information Security Consultant.
In addition to CISM certification, employers often look for professionals with skills such as: - Cybersecurity - Network Security - Security Risk Management - IT Governance
As you prepare for CISM job opportunities in India, remember to showcase your expertise in information security, risk management, and governance during interviews. Stay updated with the latest trends in cybersecurity and practice answering both technical and situational questions confidently. Good luck in your job search!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
31458 Jobs | Dublin
Wipro
16542 Jobs | Bengaluru
EY
10788 Jobs | London
Accenture in India
10711 Jobs | Dublin 2
Amazon
8660 Jobs | Seattle,WA
Uplers
8559 Jobs | Ahmedabad
IBM
7988 Jobs | Armonk
Oracle
7535 Jobs | Redwood City
Muthoot FinCorp (MFL)
6170 Jobs | New Delhi
Capgemini
6091 Jobs | Paris,France