Jobs
Interviews

743 Cism Jobs - Page 3

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4.0 - 8.0 years

13 - 17 Lacs

Gurugram, Bengaluru

Work from Office

BE/B.Tech/Post-Grad/ Graduate or Postgraduate in any other discipline 4-8 years of relevant experience. Candidates should be okay to work in rotational shifts. Good to have - Certifications - CSA (Certified SoC Analyst), CISM and CCSP, Certifications from Microsoft Azure Suite Candidates having SOC experience would be preferred Well versed in Microsoft productivity tools such as Word, PowerPoint and Excel An understanding of concepts of analytics and should be able to generate trends, drill downs, and various graphical representations Windows / Azure / AWS infrastructure knowledge will have added advantage Experience in Windows security tools like Defender for office, Defender for identity, Sentinel and other Microsoft security tools will have added advantage Excellent written and oral communication skills . Actively monitoring, analysing & escalating SIEM alerts based on correlation rules, Email protection alerts & malware analysis, Provide inputs for proactive content fine tuning & use case enablement, Active threat hunting on network flow, user behaviour & threat intelligence, Phishing email analysis for MFs, Raising incidents in Pastebin inte Should be familiar with Domain Knowledge (Cyber Security), Threat Hunting, SIEM- Azure Sentinel, SIEM - (RSA / Splunk / LogRhythm), Python Scripting, Windows Active Directory, Operating systems and servers. Ability to Triage and assignment Incident Handling. Ability to Follow Playbooks instructions- Incident Response Playbooks Ability to Comprehend Logs (HTTP, SMTP, Network) (Under guidance) Understand and imbibe current SOC process Perform quality assessment on SOC operations being performed as per existing process Record and deviations identified into tracking tool(s)/spreadsheets Perform follow-ups with respective error owners to mitigate process deviations Identify process deviations, Summarize and generate trends, patterns into process deviations / errors observed. Perform RCA into observed errors / trends and generate recommendations for process improvement Generate personnel specific recommendations for performance enhancement Contribute in overseeing quality assessment process for multiple SOC verticals In-line alignment with SOC operations for quick-detection / prevention of process deviations Support as QA touchpoint in critical cyber incidents to enhance quality of service Assessment of investigation report with assertions, evidences and recommended actions

Posted 4 days ago

Apply

8.0 - 10.0 years

35 - 40 Lacs

Mumbai

Work from Office

Business Function Technology and Operations (T&O) enables and empowers the bank with an efficient, nimble and resilient infrastructure through a strategic focus on productivity, quality & control, technology, people capability and innovation. In Group T&O, we manage the majority of the Banks operational processes and inspire to delight our business partners through our multiple banking delivery channels. Job Purpose: The Head of IT Infrastructure is a strategic leadership role responsible for overseeing the design, implementation, and management of the bank s IT infrastructure, including data centres, cloud services, network systems, branch IT infrastructure, and Information Security Risk Management. The role ensures high availability, scalability, security, and efficiency of IT systems across 500+ branches in India while aligning with global IT standards and regulatory requirements. Key Responsibilities: IT Infrastructure Strategy & Leadership - Define and execute the IT infrastructure roadmap in alignment with business objectives and digital transformation initiatives. - Lead a large team of IT professionals across infrastructure, security, and operations. - Ensure cost-effective, scalable, and high-performance IT infrastructure solutions. Data Center & Cloud Management - Oversee the design, implementation, and management of on-premise data centers, hybrid cloud, and multi-cloud strategies. - Ensure 24/7 availability, disaster recovery, and business continuity planning. - Optimize data center operations for efficiency, security, and compliance (RBI, SEBI, ISO 27001, etc.). - To oversee multiple projects and manage Pivot Cloud, comprising over 1200 servers and a team of 100 members, including contractors and direct employees Branch IT Infrastructure - Manage the deployment, maintenance, and support of IT infrastructure across 500+ branches. - Ensure seamless connectivity, network security, and digital banking capabilities at branch locations. - Drive automation and standardization of branch IT systems for operational efficiency. Information Security & Risk Management - Strengthen cybersecurity posture by implementing robust security frameworks (NIST, CIS, RBI guidelines). - Oversee vulnerability assessments, penetration testing, and security audits. - Ensure compliance with regulatory requirements (RBI, DPDPA, IT Act, etc.) and mitigate IT risks. Network & Enterprise Systems - Manage enterprise-wide network architecture (SD-WAN, MPLS, VPN, Zero Trust) and IT operations. - Lead infrastructure modernization initiatives (software-defined infrastructure, automation, AIOps). - Partner with vendors, regulators, and internal stakeholders for seamless IT service delivery. Budget & Vendor Management - Develop and manage the IT infrastructure budget, ensuring cost optimization. - Evaluate and manage third-party vendors, cloud providers, and outsourcing partners. Requirements Education: Bachelor s or master s degree in computer science, IT, or related field. Certifications like CISM, CISSP, ITIL, TOGAF, or cloud certifications (AWS/Azure/GCP) are preferred. Experience: 20+ years in IT infrastructure leadership, with at least 8-10 years in banking/financial services. Technical Expertise: - Strong knowledge of data center operations, cloud technologies, and network security. - Experience in managing large-scale IT infrastructure for distributed branch networks. - In-depth understanding of RBI cybersecurity guidelines and financial sector compliance. - Leadership Skills: Proven ability to lead large teams, influence stakeholders, and drive digital transformation. Key Competencies: - Strategic thinking & innovation - Risk management & regulatory compliance - Vendor & stakeholder management - Strong decision-making & problem-solving skills - Excellent communication & leadership

Posted 4 days ago

Apply

10.0 - 17.0 years

30 - 40 Lacs

Bengaluru

Hybrid

We are reaching out regarding an exciting opportunity in Cybersecurity Operations Leadership with a global organization known for innovation and resilience in cyber defense. In this role, you'll lead a 24x7 global Security Operations Center (SOC) and drive strategy and execution across threat detection, incident response, forensics, and automation using tools like Splunk, Phantom, CrowdStrike, and Tanium. Youll work closely with audit and compliance teams and ensure security operations are aligned with regulatory and industry best practices (NIST, MITRE ATT&CK, ISO 27001). Key Highlights: Lead SOC teams and security incident response globally Enhance SIEM/SOAR platforms, automate detection & response Hands-on experience with forensic tools, cloud security (AWS/Azure), and vulnerability management Strategic reporting, playbook creation, and regulatory compliance Preferred certifications: CISSP, CISM, GCIH, GCFA, CEH, or equivalent Experience: 10–15 years with at least 3–5 years in Cybersecurity Operations If you’re passionate about building world-class cybersecurity defense mechanisms and enjoy leading high-performing teams, we’d love to speak with you!

Posted 4 days ago

Apply

7.0 - 9.0 years

12 - 15 Lacs

Gurugram

Work from Office

Role & responsibilities GRC Manager, inter alia, be responsible for the following: Plan and establish organization-wide Information security Management System (ISMS) in accordance with ISO/IEC 27001 Standard, and other relevant security standards, Evaluate compliance with respect to legal and regulatory requirement for information security. Perform information security audit at least annually or whenever significant changes have been made in IT systems/ Infrastructure. Prepare information security audit report along with recommendations for improving information security. Monitor and manage information security risks and highlight them to various stakeholder Monitor information security measurement metrics and other key performance / risk indicators on regular basis Review information security / IT polices, standards, procedures, guidelines and processes. Review products / application for various information security risks and suggest control measure to mitigate them Help in defining / documenting information security presentation to various stakeholders Giving information security awareness training to employees and third parties Help in defining and monitoring cloud security controls Enforce and Monitor implementation of approved information security policies, procedures, guideline and ISMS etc. Design and Issue alerts and advisories with respect to new vulnerabilities / threats to all concerned. Continuous monitoring of security incidents. Take remedial action to reduce the same. Cyber Security Incident Response and Recovery Management. Competencies: Good communication and writing skills. High energy professional. Technical & functional expertise Familiarization with emerging technology Knowledge of relevant legislative or regulatory requirements such as IT Act and associated Rules, Privacy legislations etc

Posted 4 days ago

Apply

8.0 - 12.0 years

0 Lacs

chennai, tamil nadu

On-site

At EY, you will have the opportunity to shape your future with confidence by joining a globally connected powerhouse of diverse teams. As part of our highly successful Cyber Security team, we are currently seeking Security Architects with varying levels of experience. Whether you are considering a career change now or in the future, we invite you to connect with us and explore this exciting opportunity to contribute to building a better working world. As a Security Architect at EY, you will play a crucial role in leading the implementation of security solutions for our clients. You will work alongside an international team of specialists to address complex information security needs and enhance our clients" business resilience. Your responsibilities will include designing security solutions, developing security policies and guidelines, evaluating existing security controls, and collaborating with stakeholders to ensure effective security measures are in place. To excel in this role, you must possess expert-level knowledge in technical IT security domains such as infrastructure, networks, databases, security monitoring, and cloud security. Additionally, you should have experience in assessing solution architectures for security issues, managing multiple stakeholders, and implementing security vulnerability remediation strategies. Industry certifications such as CISSP, CISA, CISM, and experience in areas like Cyber Threat Management, Identity & Access Management, and Data Protection will be advantageous. To qualify for this role, you should have 8-10 years of professional experience in cyber security consulting, strong project management skills, and advanced communication abilities. While technical skills are essential, we value candidates who demonstrate strong interpersonal skills, relationship-building capabilities, and a commitment to delivering excellence in client service. Joining EY offers you the opportunity to work on inspiring projects, receive support and coaching from engaging colleagues, and develop new skills to progress your career. You will be part of a diverse and interdisciplinary environment that promotes knowledge exchange and emphasizes high quality in all endeavors. At EY, you will have the freedom and flexibility to shape your role in a way that suits you best, supported by a culture that values individual growth and personal development. If you are looking to be part of a market-leading team of professionals, collaborate with leading businesses globally, and contribute to building a better working world, we invite you to explore the exciting opportunities available at EY.,

Posted 5 days ago

Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

The role of Senior Technology Auditor at Booking Holdings involves planning and executing IT operational, governance, and compliance related audits at Booking.com and other Booking Holdings companies. This position is based in Bangalore COE and may require occasional travel to other Booking Holdings companies. In this role, you will be responsible for planning and executing SOX control testing across Booking Holdings companies, as well as IT operational audits covering a wide range of topics. You will coordinate with stakeholders such as Risk & Compliance, Product Development & Engineering, Central Security & Technology teams, External Auditors, and others. Additionally, you will assist in conducting risk assessments, identifying controls to mitigate risks, and documenting audit results in accordance with internal audit department and Institute of Internal Auditors (IIA) standards. Furthermore, you will support in preparing audit reports for senior management and leadership teams, provide advice on internal control, participate in enhancing control procedures for Holdings companies, and drive continuous improvement of the internal audit function. The ideal candidate for this role should have strong knowledge of various IT environments gained through at least 5 years of relevant experience in IT. They should possess an understanding of risk definitions and controls implementation in an IT environment, negotiation skills, relationship building skills, problem-solving abilities, and timely problem escalation skills. Excellent analytical, report writing, oral communication, time management, and organizational skills are essential, along with a minimum of a Bachelor's degree preferably in Technology and certifications such as CISA/CISM/CISSP or equivalent. The successful candidate should be a culture fit for the energetic and fast-paced environment at Booking Holdings, displaying a self-starter attitude, commercial awareness, results-oriented approach, data-driven decision-making skills, stakeholder management abilities, relationship-building skills, and a commitment to self-development. Being detail-oriented while grasping the bigger picture is crucial for this role. Booking Holdings values diversity and inclusivity within its team, aiming to provide an environment that fosters innovation, creativity, and collaboration. The Global Internal Audit function at Booking Holdings plays a key role in providing assurance, analysis, insights, and advice on key risks, working towards making the company stronger and more successful. GIA operates globally, partnering with brands and individuals across cultures to drive positive change and growth within the company.,

Posted 5 days ago

Apply

5.0 - 9.0 years

0 Lacs

maharashtra

On-site

The Manager, Continent Information Security Partnerships, Property Security Compliance plays a crucial role in managing continent security aspects related to the Marriott Security Compliance Assessment program. Your primary responsibilities include planning, executing, and overseeing the program to ensure maximum security compliance status across IT Operations in the continent. You will enforce Marriott Security Standards and requirements for properties, while reporting directly to the Senior Director/Director, Continent Information Security Partnerships. Building strong relationships with Area Operation/IT Leaders, you will offer support to continent operations and collaborate with various Information Security teams. This role involves up to 75% travel for work purposes. **Candidate Profile:** **Education and Experience:** - 5+ years of Information Technology or information security work experience, with a focus on technology plans and/or information security projects. - 3+ years of experience in implementing enterprise security risk management frameworks. - Bachelor's degree in Computer Sciences, Information Technology, Information Security, Cybersecurity, or equivalent field experience. - Proficiency in spoken and written English. **Preferred:** - Professional certifications related to security assessment (e.g., CISA, CRISC, PCI ISA, ISO/IEC 27001 Lead Auditor). - Knowledge of Hotel IT Management and Cybersecurity. - Understanding of PCI DSS, NIST CSF, and global regulatory standards. - Expertise in network and technical security controls. - Experience in coordinating security incident responses. - Ability to apply organizational information security policies effectively. - Familiarity with IT security in an infrastructure environment. - Proven ability to prioritize tasks in high-pressure environments. - Graduate/postgraduate degree. **Core Work Activities:** - Conduct audits, security assessments, and control reviews across various domains. - Evaluate the effectiveness of information security controls aligned with corporate standards. - Perform risk-based assessments and identify vulnerabilities and improvement opportunities. - Develop and manage audit or assessment programs from planning to follow-up. - Collaborate with stakeholders to develop remediation plans and track progress. - Prepare detailed audit reports with actionable findings. - Contribute to the enhancement of information security internal audit methodology. - Additional Functions include representing Security in new property openings, providing tactical communications, tracking compliance performance, and reporting on security & compliance metrics. **Additional Responsibilities:** - Keep supervisors and team members informed through effective communication. - Attend relevant meetings and present information clearly. - Use problem-solving methodology for decision-making. - Maintain positive working relationships and manage time effectively. - Perform any other duties as assigned by the manager. Marriott International is an equal opportunity employer, committed to a diverse workforce and an inclusive, people-first culture. Non-discrimination based on any protected basis is our principle, ensuring fairness and respect for all employees.,

Posted 5 days ago

Apply

4.0 - 7.0 years

6 - 9 Lacs

Mumbai

Work from Office

We are seeking a highly skilled and proactive Cybersecurity Engineer with deep expertise in Micro-Segmentation and Data Loss Prevention (DLP) technologies. This role will be instrumental in designing, implementing, and managing security strategies to prevent lateral movement within the network and safeguard sensitive data against unauthorized access or leakage. Roles & Responsibilities :- Micro-Segmentation: Design and implement micro-segmentation strategies using tools such as VMware NSX, Illumio, Guardicore, or Cisco Tetration. Perform network traffic analysis and application dependency mapping to define security zones. Collaborate with network and application teams to deploy and fine-tune segmentation policies with minimal business disruption. Monitor and adjust policies to respond to emerging threats or changes in business architecture. Ensure micro-segmentation aligns with Zero Trust architecture principles. Data Loss Prevention (DLP): Implement and manage enterprise DLP solutions (e.g., Symantec, Microsoft Purview, Forcepoint, McAfee). Define DLP policies and controls to detect, monitor, and prevent unauthorized sharing of sensitive data across endpoints, emails, cloud, and network channels. Conduct regular tuning and testing of policies to reduce false positives while maintaining strong enforcement. Collaborate with legal, compliance, and data governance teams to ensure alignment with regulatory and organizational requirements. Generate regular reports and metrics on policy violations, incidents, and effectiveness. Qualification :- Bachelor s degree in Computer Science, Information Security, or a related field. 4 7 years of experience in cybersecurity, with at least 2+ years in micro-segmentation and/or DLP implementation and operations. Hands-on experience with segmentation tools (VMware NSX, Illumio, Guardicore, etc.) and DLP platforms (Symantec, Microsoft Purview, etc.). Strong knowledge of network protocols, firewall policies, and endpoint security. Familiarity with regulatory standards such as GDPR, HIPAA, PCI-DSS, etc. Relevant certifications (preferred): CISSP, CISM, CCSP, CEH, or vendor-specific (e.g., Illumio Certified Engineer, Microsoft Information Protection certification).

Posted 5 days ago

Apply

7.0 - 12.0 years

9 - 14 Lacs

Hyderabad

Work from Office

What you get to do in this role: Lead initiatives to integrate cybersecurity automation into system designs, ensuring streamlined and proactive threat detection and response mechanisms. Develop leadership strategies to mentor and empower team members in adopting best practices for cybersecurity, fostering innovation and accountability. Champion the adoption of advanced cybersecurity tools and frameworks, aligning organizational goals with cutting-edge technology to maintain robust systems integrity. Manage the quarterly and annual planning, team objectives, individual goals, deliverables, hiring, development plans, and performance reviews. Provide technical guidance for systems optimization opportunities and participate in architectural reviews. Assess cyber hygiene risks, vulnerabilities, and mitigations to ensure these systems are highly available, operationally sound, perform at scale, and exceed customer expectations. Collaborate with peer teams on complex, global engineering efforts to ensure architecture agreement, resource coordination, and implementation timelines. Represent the global Systems Engineering team to both internal and external stakeholders. To be successful in this role you have: Experience in leveraging or critically thinking about how to integrate AI into work processes, decision-making, or problem-solving. This may include using AI-powered tools,

Posted 5 days ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Bengaluru

Work from Office

Meet the Team You will be part of an outstanding technical pre-sales team in our Global Security Sales Organization (GSSO), responsible for driving the success of Cisco s Security Portfolio and focusing on protecting Customer Application Environments across on-prem and cloud platforms. Our mission is to democratize security by making it easy and effective for everyone. Your Impact As a key player in the team, you will have the opportunity to influence the security landscape by crafting tailored solutions that address specific customer needs. This role offers the excitement of working with cutting-edge technology and the fulfillment of building long-lasting relationships with customers. You will: Provide guidance and assist account teams in building solutions to address specific customer security needs. Understand business requirements and translate them into technical solutions. Create, present, and document technical solutions to customers, partners, and prospects. Lead technical consulting and upper-level management presentations. Drive major account opportunities while enabling local account teams to maintain long-term ownership. Minimum Qualifications Minimum of 5 years of technical sales or pre-sales experience with 3+ years in Security specialization in Network Security and technologies including NGFW/NGIPS, Network Analytics, Content & Cloud Security (i.e. Email, Web, Anti-Spam, DNS security, CASB, SASE, SSE), Advanced Threat Solutions and Endpoint Security. Bachelors degree in Cybersecurity, Computer Science, or a related field. Proven track record of successful quota achievement. Strong knowledge of cybersecurity concepts, technologies, and best practices. Industry certifications such as CISSP, CISM, or CCSP are preferred. Preferred Qualifications Excellent presentation and interpersonal skills. Commercial awareness and strong communication skills. Highly motivated self-starter who excels without day-to-day management. Experience with Cisco security technologies and programming languages such as UNIX shell, Perl, or C. Willingness to travel and work from a home office. #WeAreCisco At Cisco, we re revolutionizing how data and infrastructure connect and protect organizations in the AI era and beyond. We ve been innovating fearlessly for 40 years to create solutions that power how humans and technology work together across the physical and digital worlds. These solutions provide customers with unparalleled security, visibility, and insights across the entire digital footprint. Simply put we power the future. Fueled by the depth and breadth of our technology, we experiment and create meaningful solutions. Add to that our worldwide network of doers and experts, and you ll see that the opportunities to grow and build are limitless. We work as a team, collaborating with empathy to make really big things happen on a global scale. Because our solutions are everywhere, our impact is everywhere. We are Cisco, and our power starts with you. Message to applicants applying to work in the U.S. and/or Canada: When available, the salary range posted for this position reflects the projected hiring range for new hire, full-time salaries in U.S. and/or Canada locations, not including equity or benefits. For non-sales roles the hiring ranges reflect base salary only; employees are also eligible to receive annual bonuses. Hiring ranges for sales positions include base and incentive compensation target. Individual pay is determined by the candidates hiring location and additional factors, including but not limited to skillset, experience, and relevant education, certifications, or training. Applicants may not be eligible for the full salary range based on their U.S. or Canada hiring location. The recruiter can share more details about compensation for the role in your location during the hiring process. U.S. employees have access to quality medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, short and long-term disability coverage, basic life insurance and numerous wellbeing offerings. Employees receive up to twelve paid holidays per calendar year, which includes one floating holiday (for non-exempt employees), plus a day off for their birthday. Non-Exempt new hires accrue up to 16 days of vacation time off each year, at a rate of 4.92 hours per pay period. Exempt new hires participate in Cisco s flexible Vacation Time Off policy, which does not place a defined limit on how much vacation time eligible employees may use, but is subject to availability and some business limitations. All new hires are eligible for Sick Time Off subject to Cisco s Sick Time Off Policy and will have eighty (80) hours of sick time off provided on their hire date and on January 1st of each year thereafter. Up to 80 hours of unused sick time will be carried forward from one calendar year to the next such that the maximum number of sick time hours an employee may have available is 160 hours. Employees in Illinois have a unique time off program designed specifically with local requirements in mind. All employees also have access to paid time away to deal with critical or emergency issues. We offer additional paid time to volunteer and give back to the community. Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components. For quota-based incentive pay, Cisco typically pays as follows: .75% of incentive target for each 1% of revenue attainment up to 50% of quota; 1.5% of incentive target for each 1% of attainment between 50% and 75%; 1% of incentive target for each 1% of attainment between 75% and 100%; and once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation. For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid.

Posted 5 days ago

Apply

6.0 - 11.0 years

20 - 25 Lacs

Bengaluru

Work from Office

The Opportunity FICO is seeking Cyber Security Engineer to join our growing GRC Team. This is a full-time regular position (hybrid), and a great opportunity for an individual with strong PCI, ISO 27001, SOC2 audit skills or great interest in security Compliance and Risk Management frameworks and grow in exciting field of GRC" Director, Cyber Security. What Youll Contribute 3+ years of applicable work experience, in performing and running audits, certification programs and control assessments, including but not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, mapping issues to risks and socializing results. Coordinate audit-related tasks to ensure the readiness of managers and their teams for audit testing and facilitate the timely resolution of any audit findings. Strong knowledge of common security legal and regulatory requirements (e.g., PCI, SOC, CSA STAR, NIST, ISO/IEC 27001, COBIT, etc.) Work on compliance initiatives to ensure operational effectiveness with applicable laws and regulations, as well as internal policies and procedures. Monitor activities of assigned IT areas to ensure compliance with internal policies and standards. Assist Corporate Compliance and the Business with all required compliance/security-related documentation. Facilitate for external audits to ensure compliance with all industry-mandated regulations Participate in the development and implementation of new business initiatives to ensure functionality required to support compliance. Provide guidance to business functions on compliance/security-related matters. Good understanding of IT concepts, including Cloud hosting, containerization, encryption, networking, operating systems, databases, middleware, and applications Knowledge of or experience working with, Cloud technologies/environments, AWS or other related cloud experience is required. Ability to effectively communicate to all levels of the organization, including senior management, and other stakeholders that influence the security and compliance posture of FICO Ability to assess the nature of controls and identify automation opportunities for increased monitoring and scaling coverage What We're Seeking Bachelors degree in the field of Information Security, Computer Science or discipline and/or certifications (e.g., ISO 27001 LI/LA, ISA/QSA, CISSP, CISA, CISM, and related GIAC.) Demonstrated ability to apply IT-related knowledge and experience in solving compliance issues. Experience implementing cloud security and compliance standards, frameworks, and controls (ISO/IEC 27001, SOC 2, PCI, NIST) for cloud service delivery models (IaaS, PaaS, SaaS) AWS Certifications (added advantage) Experience or understanding of governance, risk and compliance (GRC) processes and solutions. Background in security controls, auditing, network and system security. Ability to express technical concepts in business terms. Able to work well under deadlines in a changing environment and complete multiple projects effectively and concurrently. Evaluate effectiveness of the internal security control framework and recommend adjustments as business needs change. Regularly interact with all levels of management to present and discuss audit results and obtain gap remediation status.

Posted 5 days ago

Apply

10.0 - 15.0 years

6 - 14 Lacs

Vadodara

Work from Office

Role & responsibilities : Design and comply with applicable ISO27001 and NIST CSF standards. Monitor and protect against IT security threats with regular and effective oversight, testing, awareness building and employee training. Help develop a company-wide cultural mentality regarding the importance of information security. Prepare reports on IT security issues, testing, threats and incidences on a regular basis. Perform information security risk assessments. Identify and track the resolution of security incidences and vulnerabilities. Develop communication plans in advance of incidents to ensure a prompt and strategic response to both internal and external personnel. Ensure that adequate physical security controls exist to protect sensitive data and information systems. Responsibilities include asset, building, and network protection. Participate in the development, implementation, and ongoing compliance monitoring of all trading partner and business associate agreements, to ensure all security concerns, requirements, and responsibilities are addressed. Qualifications: Bachelors degree or masters degree in a computer field. Ten years or more IT operations experience and management. Ten years or more of experience leading technology projects in a high uptime, telecom, call center and/or Software-as-a-Service environment. CISSP or CISM qualifications Track record of ISO27001 program implementation, certification and maintenance In-depth knowledge of Windows and Linux server environments Ability to maintain composure and sound judgment in high-pressure environments Demonstrated leadership and personnel/project management skills Highly self-motivated and directed Proven analytical and problem-solving abilities Strong customer service orientation Experience working in a team-oriented, collaborative environment

Posted 5 days ago

Apply

8.0 - 12.0 years

20 - 30 Lacs

Bengaluru

Work from Office

Hiring a Senior Cybersecurity GRC Consultant, you will play a pivotal role in helping organizations manage and improve their Governance, Risk, and Compliance (GRC) frameworks. You will be responsible for setting up and leading assessments, implementing strategies, and advising clients on how to mitigate cybersecurity risks and achieve compliance with industry standards and regulatory requirements. 8+ Years of Experience in cybersecurity, risk management, and governance, with a proven track record of leading GRC initiatives. Educational Background: Bachelors or Masters degree in Information Technology, Cybersecurity, Computer Science, Business Administration, or a related field. Certifications: Relevant cybersecurity certifications such as CISSP, CISA, CISM, ISO 27001 Lead Auditor, ISO 27001 Lead Implementer, or similar. Must have experience in customer facing projects (onsite / offsite); Should be able to lead the junior team members. In-depth Knowledge of Cybersecurity Frameworks: Expertise in implementing and advising on security frameworks such as Unified Cybersecurity Framework, NIST/RBI/IRDAI/SEBI Cybersecurity Frameworks, ISO 27001/2, CIS Controls etc. Project Management: Proven ability to manage and lead multiple GRC projects simultaneously, with strong organizational and time-management skills. Client-Focused: Demonstrated ability to build and maintain relationships with clients, providing expert advice and ensuring customer satisfaction. Cloud Security: Knowledge of cloud environments (AWS, Azure, Google Cloud) and their associated risks and compliance requirements. Penetration Testing & Vulnerability Management: Familiarity with vulnerability assessment, penetration testing, and ethical hacking practices. Incident Management: Experience in developing or improving incident response plans, business continuity plans, and disaster recovery strategies.

Posted 5 days ago

Apply

2.0 - 4.0 years

6 - 10 Lacs

Pune

Work from Office

0px> Who are we Amdocs helps those who build the future to make it amazing. With our market-leading portfolio of software products and services, we unlock our customers innovative potential, empowering them to provide next-generation communication and media experiences for both the individual end user and enterprise customers. Our employees around the globe are here to accelerate service providers migration to the cloud, enable them to differentiate in the 5G era, and digitalize and automate their operations. Listed on the NASDAQ Global Select Market, Amdocs had revenue of $5. 00 billion in fiscal 2024. For more information, visit www. amdocs. com In one sentence Secures enterprise information by developing, implementing, and enforcing security controls, safeguards, policies, and procedures What will your job look like Develop, implement, and administer security policies and plans for Amdocs as well as carry out information security activities in accordance with the established policies and guidelines Build and assess security policies for the OS, network, and database. This will require analyzing and evaluating security vulnerabilities, and managing security systems such as anti-virus, firewalls, patch management, intrusion detection, and encryption Recommend fixes, security patches, and any other measures required in the event of a security breach. Assist in coordinating contingency plan tests on a periodic basis Coordinate security orientation and security awareness programs. You will build standard operating procedures for security tools and processes per industry best practices Be responsible for carrying out penetration testing and vulnerability assessments to align with client security needs across countries You will design, implement, and report on security system and end-user activity audits; monitor server, application, and network traffic for unusual or suspicious activity; interpret activity and make recommendations for resolution You will be responsible for coordinating, assessing & addressing customer security needs All you need is. . . Bachelor degree in engineering or equivalent CISA/CISM preferable CISSP/CEH preferable ISO27001 certified Experience with operating systems (Windows, Linux, and Unix) and network Knowledge and hands-on experience with TCP/IP and other network protocols. Knowledge of firewall architecture and design, network architecture, and monitoring and reporting solutions to proactively identify issues and mitigate risk Knowledge of information security concepts and methodologies Knowledge of compliances (PCI DSS, SoX, DPA, and so on) and IS standards (ISO 27001, BS25999, ISO 20000, OWASP, and so on) Knowledge of risk management methodologies and approach Knowledge of Secure SDLC methodology Why you will love this job: You will be able to demonstrates an understanding of key business drivers and ensures strategic directions are followed and the organization succeeds You will be able to gathers relevant data, identifies trends and root causes, and draws logical conclusions to develop solutions You will have ability to assess details, systems and other factors as part of a single and comprehensive picture We are a dynamic, multi-cultural organization that constantly innovates and empowers our employees to grow. Our people our passionate, daring, and phenomenal teammates that stand by each other with a dedication to creating a diverse, inclusive workplace! We offer a wide range of stellar benefits including health, dental, vision, and life insurance as well as paid time off, sick time, and parental leave

Posted 5 days ago

Apply

5.0 - 10.0 years

9 - 14 Lacs

Chennai

Work from Office

Major Responsibilities: Manage the Perimeter Security technologies deployed by Tata Communication on client infrastructure including Firewall, Proxy, 2FA, etc. Handle change and support requests from customers Perform initial troubleshooting on issues and escalate to shared SOC team as needed via portal, email or phone. Follow up requests and incidents for resolution and ensure client is communicated regularly Establish good working relationship with the stakeholders on the client side Send regular reports on the tasks performed to the TCL Manager Provide hands and feet support for the remote team inside the client infrastructure for troubleshooting and other activities. Work with vendors to resolve internal and customer issues in a timely manner Support client on their regular office days. Candidate would also be expected to be flexible with timings to support issues and major activities like upgrades or maintenance. Experience and qualification Bachelors degree in Engineering or equivalent 5-8 years of Experience in Networking and Perimeter Security. Good knowledge in Firewalls, Proxies and in Two Factor Authentication Technical Skills: Candidate should have handled at least any two of the Firewall products. Cisco, Checkpoint, Palo Alto, and FortiGate, Experience with any of these Proxy products Bluecoat or Zscaler. Understanding of security landscape and different tools used Good Communication and interpersonal Skills are mandatory. Industry certifications in the above products would be an added advantage. Familiarity with ITIL framework would be an advantage

Posted 5 days ago

Apply

6.0 - 10.0 years

0 Lacs

coimbatore, tamil nadu

On-site

As a SOC Architect at Sennovate, located in Coimbatore, you will be a part of an Information Security managed Security Service provider specializing in Identity and Access Management (IAM) and Security Operations Center (SOC) powered by AI. Your role will involve leading the SOC Team with a strong focus on research and development in the Security domain. If you align with Sennovate's culture, which emphasizes accountability, respect, continuous learning, personal ownership, rejecting average standards, showing gratitude, and valuing time and simplicity, then you are the right fit for this role. Your responsibilities will include providing technical leadership in designing, implementing, and maintaining SOC systems. You will be expected to embrace thought leadership, provide mentorship to team members, and develop strategies to enhance security protocols, incident response, and threat detection capabilities. Additionally, you will drive improvements in SOC processes, workflows, and toolsets, while also leading the R&D team in exploring innovative security solutions. The ideal candidate will hold a Bachelor's degree in Computer Science, Information Technology, or a related field, with 6-10 years of extensive experience in SOC operations, security architecture, and design. Hands-on experience with security tools across various platforms, strong knowledge of Linux and Windows OS, and an understanding of security architectures are required. Additionally, the candidate should have excellent communication and presentation skills, demonstrated expertise in leading R&D initiatives, and relevant certifications such as CISSP, CISM, or CISA would be advantageous. Strong leadership, communication, and problem-solving skills are also essential for this role.,

Posted 6 days ago

Apply

15.0 - 20.0 years

35 - 45 Lacs

Bengaluru

Work from Office

We are seeking a technically strong IT person to oversee IT operations, infrastructure, software development, and cybersecurity practices in alignment with ISO/IEC 27001:2022.

Posted 6 days ago

Apply

10.0 - 20.0 years

45 - 85 Lacs

Bengaluru

Work from Office

1 Role title: Cyber Security Architect Grade Required Qualifications Advanced degree in Computer Science 5+ years of cyber security engineering experience Any of the following: CISSP, CISM, CEH along with Azure, GCP or AWS certifications Experience with security tools and technologies (e.g., firewalls, IPS, Email Security, SOAR, Threat Intel, SIEM, DLP, EDR, encryption, etc.). Experience in global manufacturing, pharma, and/or a life sciences company Summary of Role Duration Key responsibilities Required skills The Security Architect role is a pivotal position within the Cyber Security Office, reporting directly to the Security Architecture Lead. This role offers an exciting opportunity to collaborate with cross-functional teams from IT, Cyber Security, and Business Units to architect and design robust security solutions that effectively protect organisation's enterprise networks from evolving cyber threats. As an individual contributor, you will focus on strategic design and innovation, ensuring that our security strategies align with industry standards and best practices such as TOGAF, SABSA, Purdue, and NIST frameworks. This role is designed for individuals who are passionate about cybersecurity, possess strong expertise in security, and are eager to make a significant impact on organisation's security posture Drive the strategic design and implementation of innovative security solutions and controls Stay at the forefront of industry standards, regulations, and best practices related to IT and OT security, ensuring continuous improvement Generate comprehensive documentation, certification, and testing protocols for the deployment of new security solutions Continuously monitor and analyze current cybersecurity threats, trends, and emerging technologies to inform strategic security initiatives Work closely with engineering and architecture teams to ensure security requirements are integrated into all phases of the system development lifecycle Define and implement advanced security configurations, policies, and procedures for IT and OT assets and systems Effectively communicate with stakeholders at all levels, translating complex technical concepts into actionable security strategies Support the development and implementation of security architectures across various domains, including data security, AI, cloud, network security, monitoring detection and response, threat, risk, vulnerability asset and configuration management, and platform security Conduct security assessments and gap analyses to identify and mitigate security risks Provide technical guidance and mentorship to security engineers and other team members Perform assessments of capabilities and tools to ensure alignment with GSK business and security needs Assist with product Proof of Concept (POC) evaluations to validate security solutions Create and execute test plans to rigorously evaluate security controls and document results to provide unbiased outcomes that demonstrate alignment with GSK business and security needs in a seamless manner Proven experience in developing security strategies and reference architectures Familiarity with TOGAF, SABSA, or Purdue Enterprise Reference Architecture Experience in designing and deploying network security controls and solutions Extensive knowledge of security technologies, including encryption, authentication, authorization, security protocols, data and privacy, AI/ML, and application development Strong communication and interpersonal skills, ability to effectively manage stakeholders Proficiency in writing, developing, and maintaining technical documentation, including security standards, strategies, and implementation plans Ability to prioritize and filter actions to focus on those with significant impact on the program Capability to work with multiple stakeholders to promote practical solutions to complex security problems Excellent problem-solving and analytical skills, with the ability to work under pressure Hands-on experience in at least three of the following security domains: data security, AI, cloud, network security, monitoring detection and response, threat, risk, vulnerability asset and configuration management, or platform security Experience with threat modeling and risk assessment methodologies Experience in security automation and orchestration Knowledge of AI and machine learning security considerations Understanding of regulatory requirements/industry standards (e.g., GDPR, HIPAA, PCI)

Posted 6 days ago

Apply

8.0 - 12.0 years

20 - 27 Lacs

Ahmedabad

Work from Office

We are seeking a highly skilled Cybersecurity Officer with a strong background in information security, cyber risk management, and technical infrastructure protection.As a global provider of financial and data clearing applications for mobile network operators, we understand the critical importance of robust cybersecurity measures.This role is specifically focused on the digital security of enterprise systems, cloud infrastructure, application environments, and customer data. Nextgen Clearing is the market leading provider of global roaming services. We operate internationally across 20 global locations, employing over 300 talented people. We offer Award-winning Data and Financial Clearing services, along with unique value-added features on a single flexible online platform. Nextgen Clearing serves more than 160 operators worldwide, giving them a 24/7 holistic overview of their full roaming business Key Responsibilities: Define and implement security policies and controls to protect the company's digital assets and ensure regulatory compliance. Continuously monitor the company's security posture and quickly respond to security incidents. Develop security strategies and plans for preventing and responding to security breaches. Provide expert guidance and support to software teams on implementing secure development practices, security requirements, and conducting security testing. Foster secure application deployment and configuration, ensuring the protection of data integrity and confidentiality. Conduct regular training and awareness sessions for the company's staff to promote security best practices. Assist in the response to security incidents, including the management of communications and recovery efforts. Work collaboratively with customer service teams to safeguard customer data, enhance data privacy, and ensure secure customer interactions. Contribute to the company's efforts to prevent fraud and manage security incident communications to maintain trust with customers. Stay up-to-date on the latest cybersecurity trends, threats, and security technologies to continuously improve the organization's security stance. Collaborate with IT and other departments to establish a security-focused culture across the company. Develop and maintain documentation related to security policies, procedures, and incident response plans. Stay up to date on emerging cybersecurity threats and vulnerabilities and proactively recommend and implement countermeasures to mitigate risks. Foster security awareness and monitor security policy implementation Requirements Bachelor's degree in Computer Science, Information Security, or a related field. Master's degree or cybersecurity certifications (e.g., CISSP, CISM, CEH, TOGAF) are a plus. A minimum of 5 years of experience in information security or cybersecurity. Strong understanding of information security principles, best practices, and industry standards. Experience with implementing and managing security protocols, cybersecurity tools, and technologies. Familiarity with compliance requirements and standards such as ISO 27001, GDPR, and PCI DSS. Ability to identify security vulnerabilities and risks, as well as implement preventive and corrective measures. Knowledge of secure software development life cycle (SDLC) practices. Excellent problem-solving skills and the ability to work in a fast-paced, high-pressure environment. Strong communication and interpersonal skills to collaborate with diverse teams and educate non-technical stakeholders on security-related matters. Incident response and crisis management experience. Working Conditions: The role may require availability outside of standard business hours to respond to security incidents and maintain critical security measures. Benefits A supportive, dynamic, and collaborative work environment. Exceptional opportunities for professional and career advancement. Engagement with the leading provider of roaming services, catering to global Mobile Network Operators as clients. For more information, please visit www.nextgenclearing.com. Private Health Insurance Training & Development

Posted 6 days ago

Apply

5.0 - 10.0 years

8 - 12 Lacs

Hyderabad

Work from Office

Were looking for a Security Professional to join our growing team in Experian You will work with product teams to enhance the capabilities of our existing cloud platform, which powers our consumer products. Youll understand main parts of the platform architecture and propose, design, and promote improvements. A pragmatic approach and strong collaboration skills are important to achieving great outcomes.You will be reporting to a Senior Manager. Youll work for Hybrid (2 days WFO) from Hyderabad. What Were Looking For 5+ years of experience in Cloud Architecture and Security best practices , within AWS Hands-on experience with Microservices Architecture and Kubernetes Proficiency with Infrastructure as Code and DevOps tools such as Terraform, Git, Jenkins, Sonar, etc. Write high-quality code in Python or Java Solid experience in Public Key Infrastructure (PKI) design, cryptographic key management, and certificate management systems Experience with Privileged Access Management design, implementation, and support A hands-on, collaborative approach to embedding Security-First thinking into requirements and design Good to have: Experience participating in security audits such as SOC 2 or ISO 27001 Professional security certifications like CISSP , CISM , or AWS Cloud certifications Understanding of threats in the Financial Services sector and how to reduce them Experience developing internal security standards and policies for engineering teams Background working in large organizations across multiple teams or regions About Experian Experience and Skills AWS Cloud Architecture Terraform Python Programming Kubernetes Shift-left techniques Cryptographic Key Management Benefits Experian care for employees work life balance, health, safety and wellbeing. In support of this endeavor, we offer best-in-class family well-being benefits, enhanced medical benefits and paid time off. #LI-Onsite Find out what its like to work for Experian by clicking here

Posted 6 days ago

Apply

8.0 - 13.0 years

9 - 14 Lacs

Panchkula

Work from Office

Compliance Lead Job | GRC & Audit Expert Grazitti By continuing to use our website, you consent to the use of cookies. Please refer our Join Our Clan Description Job Description We re hiring a skilled Compliance Lead to join our Information Security Group (ISG) at Grazitti Interactive. In this high-impact role, you ll spearhead Governance, Risk, and Compliance (GRC) initiatives, drive external audit processes, develop compliance frameworks, and ensure organizational alignment with key regulatory standards. If you have a solid background in risk management, policy development, and IT audit readiness with a deep understanding of frameworks like ISO27001, COBIT, and NIST this is your opportunity to lead and create tangible impact. Skills Key Skills 8+ years in GRC, compliance, or IT risk management. Bachelor s degree in a relevant field; CISA, CISSP, or CISM preferred. Hands-on experience with ISO27001/2, ISO31000, NIST, COBIT, COSO, ITIL. Knowledge of GDPR, HIPAA, CCPA, ITGC, and SOX compliance. Strong understanding of internal controls and security policies. Experience in external/internal audits and incident response planning. Excellent communication and stakeholder management skills. Process-oriented with strong documentation and analytical capabilities. Responsibilities Roles and Responsibilities Design and execute enterprise-wide GRC strategies. Ensure compliance with GDPR, HIPAA, ISO, and other global standards. Lead documentation efforts for SOX controls and ITGCs. Collaborate with legal teams to interpret regulations. Act as the primary contact for external auditors. Lead planning, documentation, and closure of compliance audits. Conduct in-depth risk assessments and advise mitigation strategies. Maintain up-to-date risk registers and track remediation actions. Draft and implement information security policies. Establish and enforce internal controls for IT and SaaS environments. Apply COSO, COBIT, and ITIL best practices for governance. Review control effectiveness through regular audits. Design incident response plans and lead resolution efforts. Build awareness programs and train teams on compliance best practices. Drive a culture of compliance and operational integrity. Communicate risk and compliance posture to executive leadership. Document and maintain audit trails for transparency. Position: Compliance Lead Thank you for submitting your application. We will contact you shortly! Stay updated with us Life at Grazitti Share Your Profile We are always looking for the best talent to join our team * Skills Upload Your CV Thank you for sharing your profile with us. If it aligns with our requirements, we will reach out to you for the next steps in the process. Marketo Forms 2 Cross Domain request proxy frame This page is used by Marketo Forms 2 to proxy cross domain AJAX requests.

Posted 6 days ago

Apply

1.0 - 4.0 years

9 - 13 Lacs

Bengaluru

Work from Office

Visa is seeking a Controls Monitoring & Testing Analyst within its Technology Risk Management program to review and assess Cybersecurity and Technology risks. The candidate will perform Risk Assessments, Design Effectiveness Assessments, and Operational Effectiveness Testing for key technology threat vectors such as security configuration management, firewall configuration, application, user access management, and availability & reliability. Responsibilities include managing stakeholder engagement plans, participating in process walkthroughs, tracking/reporting deliverables, and producing high-quality work papers for all lines of defense and risk stakeholders. Additionally, the candidate will interpret data from source systems to perform statistical sampling and aggregate assessment across various risk management levers, collaborate with technology partners, and distill information into management and executive-level reporting. Key Responsibilities: Technology & Cybersecurity Controls Testing: Perform independent technology and cybersecurity controls testing. Document testing results in detailed workpapers. Prepare management reports based on testing outcomes. Communicate findings with stakeholders. Automation for Continuous Monitoring: Develop automation for continuous controls monitoring/auditing for technology and cybersecurity. Monitor the results of automated controls, perform investigation and follow-ups as needed. Risk & Control Self-Assessment (RCSA): Execute RCSA Risk Business Partner (RBP) controls quality review and sample-based testing. Conduct Key Risk Indicator (KRI) testing. Training, Metrics Alignment & Reporting: Develop and track risk management training. Align metrics with reporting dashboards. Develop reporting and stakeholder communication. Basic Qualifications -3 years of relevant work experience and a Bachelors degree Preferred Qualification -Bachelor s degree with 5 years of work experience in cyber, risk controls, or equivalent. -Experience with technology

Posted 6 days ago

Apply

5.0 - 6.0 years

7 - 8 Lacs

Mumbai

Work from Office

Ankura is a team of excellence founded on innovation and growth. Work on client engagements and communicate with client stakeholders Provide strategic guidance to clients on cybersecurity risk management. Enhance clients cybersecurity frameworks through expert consultation. Illustrative list of desired skill set Conduct audits to ensure compliance with cybersecurity standards and regulations. Facilitate tabletop exercises to improve incident response strategies. Perform Vulnerability Assessment and Penetration Testing (VAPT) to identify security vulnerabilities. Develop and implement cybersecurity policies and procedures. Advise clients on risk management and mitigation strategies. Conduct workshops and training sessions on cybersecurity best practices. Collaborate with teams to integrate cybersecurity measures into business processes. Analyze security infrastructure and recommend improvements. Maintain awareness of emerging threats and cybersecurity trends to advise clients effectively. Engage with stakeholders to understand their cybersecurity needs and challenges. Utilize cybersecurity tools and technologies to support consulting activities. Prepare comprehensive reports and presentations on security assessments. Ability to analyze data, prepare report and present findings coherently. Coordinating research & development on new threats, monitoring dark web and working closely with team members. Minimum 5 to 6 years of experience in cyber risk consulting and proactive cybersecurity services. Experience with cloud platforms (AWS, Azure, GCP) and understanding of cloud security frameworks. Strong understanding of network protocols, encryption technologies, and endpoint security solutions. Understanding of operating systems, e.g., Windows, Mac, Linux, iOS, and Android Ability to synthesize large volumes of information. Flexible team player, with strong interpersonal skills. Ability to multitask on various projects. Bachelors or Masters degree in Information Technology, Cyber Security, or a related field. Scripting will be a plus point to the team - Python, C, Bash, Shell, etc. Preferred Certifications: CISSP, CISM, CEH, ISO 27001 Lead Auditor. Self-starter requiring minimal direction Excellent communication skills, should be experience adapting communication style to suit different stakeholders like cross-functional teams, India and overseas Project Management, Operations or Process Improvement Experience Excellent problem-solving skills #LI-JK1 Ankura is an Affirmative Action and Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against based on disability. Equal Employment Opportunity Posters, if you have a disability and believe you need a reasonable accommodation to search for a job opening, submit an online application, or participate in an interview/assessment, please email accommodations@ankura.com or call toll-free +1.312-583-2122. This email and phone number are created exclusively to assist disabled job seekers whose disability prevents them from being able to apply online. Only messages left for this purpose will be returned. Messages left for other purposes, such as following up on an application or technical issues unrelated to a disability, will not receive a response.

Posted 6 days ago

Apply

4.0 - 7.0 years

5 - 9 Lacs

Chennai

Work from Office

The Security Analyst monitors security events from the various SOC entry channels (SIEM, Tickets, Email and Phone), based on the security event severity, escalate to managed service support teams, tier2 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Good knowledge of SIEM, SIEM Architecture, SIEM health check. Audit the SIEM in the customer environment. Troubleshoot issues regarding SIEM and other SOC tools. Good verbal/written communication skills. Build of use case for the customer. Data archiving and backup and data purging configuration as per need and compliance. Raising change management tickets for SOC Administration activities like Patch upgrade for SIEM, onboarding log sources etc. Helping L3 and L1 with required knowledge base details and basic documentations. Co-ordination SOC Monitoring team for troubleshooting issues and highlighting them to clients for further resolution and escalation. High ethics, ability to protect confidential information. Troubleshooting at device and connector/agent end to fix the anomaly reported by other team and observed on day to day basis. Building of incident reports, advisories and review if SLA has been met for Incident alerting and Incident closure. Update and maintain SOC knowledge base for new security incidents and docs. Creation of daily status report sheet and submit to SOC manager for review. Review advisories and make necessary detection measures. Provide analysis and trending of security log data from a large number of security devices. Troubleshooting non-reporting devices fix and maintain device status. Working with OEM (Tool support) in a way to resolve the issue or incident raised. Administration of Windows and Unix servers. Ready to work on 24/7 shifts to support client requirement. Required education Bachelor's Degree Preferred education Bachelor's Degree Required technical and professional expertise 2 Years of Experience in SOC monitoring and investigation. Audit the SIEM in the customer environment. Troubleshoot issues regarding SIEM and other SOC tools. Build of use case for the customer. Data archiving and backup and data purging configuration as per need and compliance. Helping L3 and L1’s with required knowledge base details and basic documentations. Co-ordination with SOC Monitoring team for troubleshooting issues and highlighting them to clients for further resolution and escalation. Troubleshooting at device and connector/agent end to fix the anomaly reported by other team and observed on day to day basis. Building of incident reports, advisories and review if SLA has been met for Incident alerting and Incident closure. Update and maintain SOC knowledge base for new security incidents and docs. Creation of daily status report sheet and submit to SOC manager for review. Review advisories and make necessary detection measures.\ Provide analysis and trending of security log data from a large number of security devices. Troubleshooting non-reporting devices fix and maintain device status. Working with OEM (Tool support) in a way to resolve the issue or incident raised. Administration of Windows and Unix servers. Building Parser for the SIEM using regex. Preferred technical and professional experience Escalation point for L1’s and SOC Monitor team. Ability to drive call and summarizing it post discussion. Good Understanding of Firewall, IDP/IPS, SIEM functioning (Generalize HLD as well as LLD). Deep understanding on Windows, DB, Mail cluster, VM and Linux commands. Knowledge of network protocols TCP/IP and ports. Team Spirit and working ideas heading to resolution of issues. Qualifications like CISA, CISM, CISSP, CEH, SANS or any other recognized qualification in Cybersecurity (SIEM/Qradar certification) will be preferred. Thorough knowledge in SIEM tool and experience in networking, Cloud security experience will be preferred. SOC Senior Analyst experience with multiple customers.

Posted 6 days ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Ping Identity Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We need skilled Ping Identity Engineer with strong experience implementing and supporting customer identity and access management (CIAM) solutions using the Ping Identity suite, including PingOne, Ping DaVinci, and PingFederate. You will design, deploy, and maintain modern CIAM capabilities, working closely with business stakeholders, developers, and security teams to deliver secure and seamless customer authentication experiences. Roles & Responsibilities:-Develop customer authentication and authorization workflows-Integrate with third-party identity providers, directories, and social logins-Configure PingOne platform (PingOne MFA, PingOne Risk, PingOne DaVinci orchestration)-Set up policies for adaptive authentication, step-up authentication, and user journeys-Implement PingFederate for SSO and federation use cases-Support provisioning and lifecycle management via PingOne-Ping DaVinci:Design and build drag-and-drop workflows for identity verification, fraud detection, and progressive profiling-Integrate DaVinci flows with APIs, third-party tools, and identity proofing services Professional & Technical Skills: - Must To Have Skills: Proficiency in Ping Identity.- Strong understanding of cloud security principles and practices.- Experience with identity and access management solutions.- Knowledge of security frameworks such as NIST, ISO 27001, or CIS.- Familiarity with risk assessment methodologies and compliance requirements. Additional Information:- The candidate should have minimum 5 years of experience in Ping Identity.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies