Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 8.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and facilitating the transition to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud security challenges. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular assessments of cloud security measures to ensure effectiveness and compliance.- Collaborate with cross-functional teams to integrate security practices into the cloud architecture. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Information and Event Management (SIEM).- Strong understanding of cloud security principles and best practices.- Experience with security incident response and management.- Familiarity with regulatory compliance frameworks relevant to cloud security.- Ability to analyze security logs and events for potential threats. Additional Information:- The candidate should have minimum 3 years of experience in Security Information and Event Management (SIEM).- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
12.0 - 15.0 years
13 - 17 Lacs
Gurugram
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Data Privacy, No Technology Specialty Good to have skills : Security Architecture DesignMinimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and transitioning to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud technologies and security threats. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Expected to provide solutions to problems that apply across multiple teams.- Facilitate training sessions to enhance team knowledge on security protocols.- Conduct regular assessments of security measures to identify areas for improvement. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Data Privacy.- Good To Have Skills: Experience with Security Architecture Design.- Strong understanding of cloud security principles and practices.- Experience with risk assessment and management frameworks.- Familiarity with compliance standards such as GDPR and HIPAA. Additional Information:- The candidate should have minimum 12 years of experience in Security Data Privacy.- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
7.0 - 12.0 years
13 - 17 Lacs
Kolkata
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : ForgeRock Access Management Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. You will be responsible for overseeing the security aspects of cloud infrastructure. Roles & Responsibilities:- Expected to be an SME, collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Develop and implement security strategies for cloud environments.- Conduct security assessments and audits to identify vulnerabilities.- Stay updated on the latest security trends and technologies.- Lead security incident response and resolution efforts. Professional & Technical Skills: - Must To Have Skills: Proficiency in ForgeRock Access Management.- Strong understanding of cloud security principles and best practices.- Experience in designing and implementing security controls for cloud environments.- Knowledge of security compliance standards and regulations.- Hands-on experience with security tools and technologies.- Good To Have Skills: Experience with Identity and Access Management solutions. Additional Information:- The candidate should have a minimum of 7.5 years of experience in ForgeRock Access Management.- This position is based at our Kolkata office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
15.0 - 20.0 years
13 - 17 Lacs
Noida
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Identity and Access Management (IAM) Operations Good to have skills : Microsoft Active DirectoryMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and overseeing the transition to cloud security-managed operations. You will engage in strategic discussions to align security measures with organizational objectives, ensuring a robust security posture in the cloud environment. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team knowledge and skills in security practices.- Monitor and evaluate the effectiveness of security measures and recommend improvements. Professional & Technical Skills: - Must To Have Skills: Proficiency in Identity and Access Management (IAM) Operations.- Good To Have Skills: Experience with Microsoft Active Directory.- Strong understanding of cloud security principles and best practices.- Experience in designing and implementing security frameworks for cloud environments.- Familiarity with compliance standards and regulations related to cloud security. Additional Information:- The candidate should have minimum 7.5 years of experience in Identity and Access Management (IAM) Operations.- This position is based at our Noida office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
3.0 - 8.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Palo Alto Networks Prisma Access Secure Access Service Edge (SASE) Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, designing robust security solutions, and documenting the implementation of cloud security controls. You will also oversee the transition to cloud security-managed operations, ensuring that all processes align with organizational standards and best practices. Engaging in continuous improvement initiatives and staying updated with the latest security trends will be essential to your role, as you work to enhance the overall security posture of the organization. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular assessments of cloud security architecture to identify potential vulnerabilities and recommend improvements.- Collaborate with cross-functional teams to ensure security measures are integrated into all cloud-based projects. Professional & Technical Skills: - Must To Have Skills: Proficiency in Palo Alto Networks Prisma Access Secure Access Service Edge (SASE).- Strong understanding of cloud security principles and best practices.- Experience with security frameworks and compliance standards such as ISO 27001, NIST, or CIS.- Familiarity with identity and access management solutions.- Knowledge of network security protocols and technologies. Additional Information:- The candidate should have minimum 3 years of experience in Palo Alto Networks Prisma Access Secure Access Service Edge (SASE).- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
3.0 - 8.0 years
1 - 5 Lacs
Hyderabad
Work from Office
Urgent Opening for Security Analyst - Hyderabad Posted On 20th Dec 2016 11:18 AM Location Hyderabad Role / Position Security Analyst Experience (required) 3+ Description Our Client is a leading IT company Title :Security Analyst Location : Hyderabad Department Operations Overview: The Security Analyst will take ownership of existing Operations controls from Security Engineers, and then improve those controls. : Develop and execute the Security Operations function Identify systems and scan for network vulnerabilities. Partner with TechOps and others to ensure the vulnerabilities discovered are closed in a timely manner Assess vendors for information security risk and recommend whether or leadership should accept the risk Report metrics and escalate issues with management as appropriate Monitor security logs to detect intrusions Coordinate incident response With guidance from the Lead Security Engineer, assess new releases of the product for security issues and approve the release on behalf of Security Monitor Security controls to discover deviations. Follow up to resolve deviations Review and approve network firewall rule requests : 3+ years of Information Security experience 1 year of experience with network, server, or application administration Basic knowledge of programming and scripting languages as well as HTML Thorough and detail-oriented Available to meet with US colleagues during US Central Time hours every working night and sometimes during US Pacific Time hours Excellent communication and interpersonal skills Self-starter eager to take on new challenges at a growing, cloud-based company Preferred: Security certification (e.g. CISSP, OSCP, CEH) Experience with any SIEM tool in SOC environment (ArcSight, Splunk, RSA enVision,etc.) Experience with application security methodologies such as OWASP Experience responding to external audits Send Resumes to girish.expertiz@gmail.com -->Upload Resume
Posted 1 month ago
15.0 - 20.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Operations Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting security controls, and transitioning to cloud security-managed operations, all while ensuring compliance with industry standards and best practices. You will engage in discussions to refine security strategies and provide guidance on implementing effective security measures across the organization. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Assist in the development and documentation of security policies and procedures.- Evaluate and recommend security technologies and tools to enhance the security posture. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Information and Event Management (SIEM) Operations.- Strong understanding of cloud security principles and best practices.- Experience with security incident response and management.- Familiarity with compliance frameworks such as ISO 27001, NIST, or GDPR.- Knowledge of network security protocols and technologies. Additional Information:- The candidate should have minimum 2 years of experience in Security Information and Event Management (SIEM) Operations.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
15.0 - 20.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Palo Alto Networks Prisma Access Secure Access Service Edge (SASE) Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and overseeing the transition to cloud security-managed operations. You will engage in strategic discussions to align security measures with organizational objectives, ensuring a robust and secure cloud environment that supports business operations effectively. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team knowledge and skills in cloud security.- Monitor and evaluate the effectiveness of implemented security measures, making adjustments as necessary. Professional & Technical Skills: - Must To Have Skills: Proficiency in Palo Alto Networks Prisma Access Secure Access Service Edge (SASE).- Strong understanding of cloud security principles and best practices.- Experience with security frameworks and compliance standards.- Ability to analyze and mitigate security risks in cloud environments.- Familiarity with incident response and disaster recovery planning. Additional Information:- The candidate should have minimum 5 years of experience in Palo Alto Networks Prisma Access Secure Access Service Edge (SASE).- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
3.0 - 5.0 years
10 - 15 Lacs
Noida
Work from Office
About The Role We at Innovaccer are looking for an Security Engineer-II who will be responsible for Risk Assessment role in our Cyber Security Team for customer & internal activities including proprietary & public data. This role will encompass the use of a broad range of security domains (Security Questionnaires, Vendor Risk Assessment, Internal and External Audits, Writing Policies & Procedures etc.).This role would be a great opportunity to learn and grow as you would be exposed to multiple security domains across multiple cloud platforms at a single time. A Day in the Life Responding to RFPs & Security Questionnaires Coordinating with RFP team and Legal team on reviewing security questionnaires/exhibits, BAA/MSA queries and respond to follow-ups and customer queries Analyzing and updating existing compliance policies, procedures and related documentations Implementing privacy controls & policies Drive Vendor Risk Assessment & Risk Management programme Maintaining communication and coordinating with corporate, legal and IT teams Implement audit controls for external audits like SOC2 Type2, HiTrusHIPAA,t, ISO27701, etc. Perform third party risk assessments and work on remediation of findings Familiar with Regulations in United States HealthCare & Middle-East Coordinating with internal teams for gathering evidences and presenting it to auditor Identify control gaps/weaknesses and formulate action plans to address What You Need Understanding of different Privacy & Compliance controls of Federal & State Regulation's Bachelors degree in Information Technology, Computer Science Engineering preferred Minimum of 3-5 years of prior experience in Information Security Risk & Compliance Hands-on experience on HIPAA, SOCII, ISO27001:2022, HiTrust etc. Familiarity of compliances like GDPR, NISTSP800-53, HiTech, FedRamp, AzRamp, MARSE, etc Vendor Risk Assessment, Respond to RFPs & Legal Review of Security Exhibits Work with Corporate compliance Team for Audits Good to have CISSP/CISA or other relevant certifications Hands-on skills in Data security controls Ready to take up more responsibilities along-with existing role Understanding of Security Architecture and proficient in immediately of data security control Able to work independently, being a team player, ability to work well under pressure Familiarization with cloud like AWS, Azure & GCP Able to multi task, prioritize, and manage time effectively Collaborates effectively and communicates efficiently Readily available to work with teams and clients outside India in USA & Middle-East
Posted 1 month ago
5.0 - 10.0 years
12 - 22 Lacs
Gurugram
Remote
We are looking for a highly skilled and motivated Thales HSM Specialist with strong Microsoft Azure expertise, especially in cryptography and payment systems. The ideal candidate should possess deep understanding of Thales Hardware Security Modules (HSMs), cryptographic key lifecycle management, and practical experience with Azure Payment HSM offering. Key Responsibilities: Manage and configure Thales HSM devices, including key generation, import/export, and secure application integration. Design and implement secure payment operations leveraging HSMs in compliance with PCI-DSS and industry standards. Work with Azure services to support HSM integration, including Azure Key Vault and Azure Payment HSM. Troubleshoot and optimize cryptographic services for performance, compliance, and security. Collaborate with cloud architects and security teams to enforce cryptographic policies and secure key usage. Support and enhance security for payment processing systems involving encryption/decryption, tokenization, and secure key injection. Document key management practices, HSM configurations, and support operations runbooks. Required Skills & Experience : Strong hands-on experience with Thales payShield or Luna HSMs. In-depth knowledge of cryptographic algorithms, PKI, and key management practices. Hands-on experience with Azure Payment HSM or Azure Key Vault Managed HSM. Knowledge of payment systems, EMV, HSM-based PIN processing, and secure remote key loading. Familiarity with PCI DSS and other regulatory compliance frameworks. Solid understanding of Microsoft Azure ecosystem, including networking, security, and identity management. Experience in scripting or automation for HSM operations (PowerShell, Bash, etc.) Preferred Qualifications: Azure certifications such as Azure Security Engineer Associate or Azure Solutions Architect. Certifications in cryptography or security (e.g., CISSP, CISM, Certified Encryption Specialist). Prior experience with cloud-native payment applications or fintech environments.
Posted 1 month ago
12.0 - 15.0 years
35 - 50 Lacs
Gurugram
Work from Office
Purpose of the role Yum! Brands Cybersecurity Division is looking for a dynamic candidate to provide Identity and Access Management leadership for our global business enterprise to provide access to digital assets, while mitigating risk to a business acceptable level. We are a company that thrives on innovation, so to be successful youll have a great degree of curiosity, as well as deep knowledge of Identity and Access Management systems (primary ISAM and ISIM), Single-Sign-On, Web Services, and Authentication Protocols (SAML, OAuth, OpenID). This role provides significant visibility; not only will you work closely with the corporate IT team, but you will also interact with the Security Architects, the Yum Senior Leadership Team; Global IT Directors and Managers; Yum Infrastructure Leaders, Yum Legal, and various vendors and service providers. Role & responsibilities Youll lead a team of 3+ engineers, and act as a mentor to experienced team members, so prior leadership experience is crucial. You are someone who can operate with minimal supervision in a complex environment and has the ability to support global IAM operations to the business. Additional responsibilities include: Developing strategic plans for securing Yums global business operations including new technology research/development/implementation Creating global IAM policies and standards, and updating the rolling 3-year global IAM operation roadmap Working with cross functional teams to ensure the confidentiality, integrity, and availability of Yum’s digital assets and systems Oversee IAM operations, incidence investigation, problem resolution and technical consultation. Provide technical oversight of IAM team to grow their knowhow through mentoring and coaching. Develop operation specifications for new IAM services, applications and service offerings Work with IAM architecture (integrated process, applications, data and technology) team to solve business problems in alignment with the current standards Work with IAM architecture and development Team to build enterprise-wide custom integration solutions w/ applications, services and processes that drive business results ensuring all Yum Security Standards. Participate in cross functional project planning activities to ensure project success and security and recovery of critical systems. Lead research of Identity and Access Management (IAM) Systems, Single-Sign-On and Authentication Technologies which lead to higher productivity and easier secure access to Yum’s global digital assets. Assets include information, desktops, servers, web services, applications, contracts and mobile devices. Develop a global 1-3 year road map for Identity and Access Management for in-store, above store, and consumer facing technologies. Ensure development of secure application and authentication standards to enable Yum’s digital growth initiatives in both web based and mobile platforms. Research and evaluate new security solutions, including lab tests, proof of concepts and pilots. Make operational and technology recommendations which influence Yum’s global operations. Provide leadership to brand and Cybersecurity division- IAM Preferred candidate profile Minimum Requirements: EDUCATION: BE/B Tech degree, graduate degree a plus, Certified Information Systems Security Professional (CISSP) a plus. EXPERIENCE (and other qualifications): IAM Subject Matter Expertise with at least 12+ years on operations, implementation and development experience integrating security solution w/ business application and processes. Minimum of 5 years leading technical teams with responsibility for Global IAM operations A deep understanding of Identity and Access Management Architecture and Operations is required. Proven experience with IBM Security (or comparable IAM solutions) and Active Directory required. Knowledge of Web Services Architecture required. Knowledge of SSO and Federation required. Knowledge of security and Java J2EE specification, Struts, WSDL, Web 2.0/WSRP. Detailed familiarity with ISIM Customization: Advance Workflow customization, Workflow Extensions, LCR customization, ID policy customization, advance provisioning, and custom UI, custom Adapter Development Detailed familiarity with ISAM and Ping Federation Concepts: Web security, Authentication, Authorization, Kerberos, Session Management, Web Proxy, Risk-Based Access A solid understanding of Information Security Architecture technologies and concepts required: Firewalls, intrusion detection, monitoring tools, encryption, certificate authority, reverse proxy, etc. Strong knowledge of Internet technologies and XML integration, including XML-Schema, XML-RPC, XML-SOAP, and/or Web Services/SOA Detailed familiarity with JSP/Servlets, SPML, DAML, JNDI, DSMLv2, LDIF, LDAP, ODBC, JDBC, JMS, JAAS, ISIM APIs Excellent written and oral communication skills with experience influencing Sr. Leaders and C-level executives. Preferred (but not required): ISIM Certified Deployment Professional ISAM Certified Deployment Professional Experience dealing with international locations and cultures is a plus.
Posted 1 month ago
6.0 - 11.0 years
10 - 14 Lacs
Hyderabad
Work from Office
Period :Immediate. Type Contract Description Minimum of 5 years of technical cyber Security Consultant experience and IT audit/compliance . Experience integrating Cyber Security technologies with existing technologies Proficient understanding of experience with audit, regulatory requirements, and standards (SOC2, ISO, HITRUST), and other related standards and certification processes. Must be passionate about contributing to an organization focused on continuously improving consumer experiences Willing to work in Eastern Time/Humana business hours .Preferred Qualifications Knowledge of key compliance and IT frameworks . such asSSAE16 SOC2, HITRUST, SOX, etc. CISA, CISSP, HCISPP, CCSP, CISM, CTPRP or similar certification
Posted 1 month ago
10.0 - 14.0 years
20 - 35 Lacs
Navi Mumbai
Work from Office
At Nouryon, our global team of Changemakers takes positive action every day, to reach higher goals collectively and individually. We create innovative and sustainable solutions for our customers to answer societys needs – today and in the future. Purpose/Key Objectives of the Job: The purpose of this role is to lead Nouryon’s Governance, Risk, and Compliance (GRC) program. Enhance short/long-term GRC program strategy to align with regulatory and business needs. Lead GRC in cross-functional projects and initiatives. Apply advanced GRC knowledge/experience to mature and improve processes, controls library, and metrics reporting. Manage and review team members day to day work product. About The Job (Job Responsibilities): Track and support compliance with various findings. Build, track and support a cyber security risk program. Build, track and support a cyber security compliance program. Develop, track and support metrics and reports on KPIs, SLAs and other internal metrics. Develop policy, processes, procedures and guidelines. Build, track and support compliance to various frameworks such as ISO 27001, NIST CSF/800-53, etc. Responsible for Penetration Testing program. Track and help improve the GRC program maturity. Provide other support to the Office of the CISO. We believe you bring (Education & Experience) Former leader role in GRC with knowledge of regulatory and industry requirements and standards. 10+ years’ experience working in an enterprise environment. Experience with multiple GRC tools such as Archer, ServiceNow GRC, etc. Preferred one or more of: CISSP, CRISC, CISA, CISM. Must have experience conducting/implementing/managing risk/compliance management frameworks. Must possess strong written and verbal communication skills. Proficiency with all Microsoft (MS) Office programs is necessary, including familiarity with SharePoint. Conducting and/or coordinating information security risk assessments for technology and security frameworks. Facilitating multiple stakeholders to agree on appropriate security solutions and verifying that security risks are mitigated appropriately. Verifying that required security controls are built into new products Performing deep dives on Information security-related processes and systems. Identifying system limitations that could lead to regulatory risks in new products and services and provide guidance for resolution and risk mitigation. Staying abreast of innovative business and technology trends in Information Security, risk, and controls and advising leadership on technology initiatives. Carrying out risk assessments and gap analysis of multi-networks and cloud environments using compliance standards and frameworks such as CSF and NIST. Creating, managing, and enforcing compliance requirements for business process and information systems and assisting in the development of Authority wide cybersecurity compliance program. Designing and/or implementing Information Security solutions in an enterprise environment. Leading initiatives for re-architecting and reengineering of security controls to enhance the security posture of the Authority. Strong knowledge of Vulnerability Management Remediation. Please apply via our online recruitment system. We will not accept applications via e-mail. Once it's with us we will review to see if we have a match between your skills and the role! For more information about our hiring process, visit: nouryon.com/careers/how-we-hire/ We look forward to receiving your application! We kindly ask our internal candidates to apply with your Nouryon email via Success Factors. We’re looking for tomorrow’s Changemakers, today. If you’re looking for your next career move, apply today and join Nouryon’s worldwide team of Changemakers in providing essential solutions that our customers use to manufacture everyday products such as personal care, cleaning, paints and coatings, agriculture and food, pharmaceuticals, and building products. Our employees are driven by the wish to make an impact and actively drive positive change. If that describes you, we will gladly make way for your ambitions. From day one we support you with your personal growth, through challenging positions and comprehensive learning and development opportunities, in a dynamic, international, diverse, and proactive working environment. Visit our website and follow us on LinkedIn . #WeAreNouryon #Changemakers
Posted 1 month ago
2.0 - 7.0 years
4 - 6 Lacs
Hyderabad
Work from Office
As an associate in RSMs growing Technology Risk Consulting, you will have the opportunity to develop into a seasoned consultant through a high degree of client and industry exposure, career development and mentorship opportunities, and a diverse and inclusive culture. The fast-paced and dynamic environment in which we operate will provide you with daily challenges and exciting opportunities. In the Technology Risk Consulting Practice, our consultants help our clients with design and optimization of controls utilizing a general knowledge of business processes, accounting, and information technologies by identifying and prioritizing risk and transform their technology risk management and assurance capabilities to be aligned to the key risks and strategies of their organization. Responsibilities include Develop an understanding of the RSM Technology Risk Consulting approach, methodology and tools Develop an understanding of the Industry leading frameworks and methodologies for Sarbanes-Oxley, COBIT, NIST and ITIL Demonstrate understanding of business processes, internal control risk management, IT controls, and related regulatory and compliance standards Perform technology risk assessments and reviewing, documenting, evaluating controls design and operating effectiveness, IT internal audit consulting activities (internal audits over ERP systems, IT security, and other IT systems), perform external audit assurance activities, and perform service organization control services activities related to SSAE18 SOC 1 and SOC 2 reporting services Performing risk analysis by reviewing the information security policy documents against industry standards/ regulatory requirements and drafting risk reports, which summarize the information security assessment including any risks to the organization Execute components of IT audits under offshore delivery model in an effective and efficient manner Use problem solving and critical thinking skills to quickly identify internal control deficiencies, evaluate their risk implications, and draw the appropriate conclusions to best advise our clients Exercise professional skepticism, judgment and adhere to the code of ethics while on engagements Ensure that documentation is compliant with quality standards of the firm Work collaboratively as a part of the team and communicate effectively with RSM consulting professionals, supervisors, and senior management in the U.S. on a daily basis Manage multiple concurrent engagements and ensure service excellence through prompt responses to internal and external clients Provide timely, high quality client service that meets or exceeds client expectations including coordinating the development and execution of the consulting work plan and client deliverables Understand RSM US and RSM Delivery Center's LOBs and work as a team in providing an integrated service delivery Ensure professional development through ongoing education Open to work on other solution sets considering business requirements. Qualifications: B.Tech/MCA/MBA with ISO 27001 Lead Auditor and up to 2 years of relevant experience in Information Security Controls, SSAE 18, SOC reports, IT Audits, IT General Controls, and IT Application Controls. Candidate should have intermediate knowledge of financials, operations and technology and its related risks Candidate should have good knowledge for SOC 1, SOC 2, IT General Controls, IT Application Controls, Information security and risk management frameworks/ standards (ISO 27001, NIST, COBIT, ITIL etc.) Qualified to pursue a job-relevant certification (CIA, CISA, CISM, CRISC, CISSP) Strong Data Analytical skills including advanced Excel skills (Vlookups, pivot tables, and basic formulas), Word and PowerPoint MS Visio skills to develop process and data flow diagrams Strong multi-tasking and project management skills Excellent verbal and written communication (English) as the position requires frequent communications with RSM International clients
Posted 1 month ago
10.0 - 20.0 years
20 - 30 Lacs
Bengaluru
Work from Office
Qualification- BE / B Tech/M.Tech / MCA Experience Atleast 10 years of experience with minimum 07 years of experience in IT Security; Hands-on experience in design & architecture of application security using J2EE security frameworks such as Spring Security or equivalent open source security frameworks, with relevant experience in global projects or in software product company; Knowledge of HSM architecture including application integration, deployment, performance optimization and tuning; Excellent understanding of best-in-class cryptographic algorithms; Sound knowledge of IT and security processes and best practices (e.g. ITIL, ISO 27001); Knowledge of ethical hacking Ability to spot risk, threat and vulnerability Experience in penetration testing. Experience in SOC Operational/ Management AND Installation. Should be familiar with both the commercially available intrusion prevention & detection software and the open-source versions Certifications like TIA Security, CISSP, CCSP or equivalent certifications Job Profile- Will be responsible for ensuring that Aadhaar applications are secure and the integrity of application components is preserved; Administer all security incidents handling and participate in all mitigation processes and perform various security audits and analyze various system logs and prepare required various events. Coordinate with various departments to evaluate all products and recommend appropriate products to enhance network securities and perform tests on architecture. Analyze all engineering processes and provide support to all firewalls and network for operating systems and scan all network devices and assist in vulnerability mitigation process. Prepare and maintain all documents for all processes and manage all security technologies for information networks and prepare all training materials for site personnel to increase security performance and perform various tests on all security products and systems. Design and enforce all security standards and procedures in systems and design all security policies and guidelines for all system security processes. Provide support to all customers and identify and resolve all issues and provide efficient training to new employees to understand all security procedures and maintain protection for all information systems. Assist all project teams and business units and provide consultation to all security processes and resolve all security issues effectively. Looking for vulnerabilities and risks in hardware and software Constantly monitoring for attacks and intrusions To Manage / monitor the Production Assets Security and those IT policy equipment are involved in DC Operation used by Operations Team Resource. Hardening of the Asset as per UIDAI security guidelines. FW port/VPN A/C/e-mail, Port opening request, E-mail A/C Creation, VPN A/C Creation & Other user credentials. Will oversee the design and development of application security architecture, auditing all modules and components and identify the security requirements to be implemented for each module and component; Prepare and maintain live document on Secure Coding standards and help in knowledge transfer of secure coding standards to Developers and Development Leads; Will design the security considerations for deployment; Support the product management and development teams in developing the application security-related component of Design documents and day to day requirements. Prepare, Review & Approve Product Design documents for all security-related changes to applications.
Posted 1 month ago
4.0 - 6.0 years
6 - 8 Lacs
Kolkata
Work from Office
Provide expertise in Identity and Access Management (IAM) and information security solutions. Implement security protocols, ensure compliance, and protect organizational systems from cyber threats through IAM solutions.
Posted 1 month ago
5.0 - 8.0 years
7 - 17 Lacs
Bengaluru
Work from Office
Greetings from Teamware Solutions a division of Quantum Leap Consulting Pvt. Ltd We are hiring a Consultant_DLP (Data Loss Prevention) Work Mode: Onsite; 5 days WFO Geography they support - US Work timings: 24x7 Rotational Shift Locations: Bengaluru Experience: 4 -8 Years ( Only Male ) Notice Period: Immediate to 15 days Qualification: BTECH/BCA/MBA/MCA strong knowledge of TPRM Interview process: 2-3 rounds Responsibilities Monitor and respond to alerts generated from the DLP systems to other technologies Understand and follow the incident response process through event escalations Follow processes to maintain the DLP system Utilize Splunk and Symantec DLP to respond to, investigate, triage and prevent client data loss via email and web Implement DLP fine-tuning rules/policies via Symantec DLP Track and present DLP metrics and findings on a monthly basis to senior management 3+ years of experience in information security preferably in the areas of incident response, investigations Experience working with SIEM solutions (Splunk, LogRhythm, QRadar, etc.) Hands on experience & working knowledge of ZScaler tools (Preferably) Certifications (e.g., GCIH, CISSP, CCSP) are preferred Familiarity performing packet analysis Zscaler : Zscaler provides users with seamless,secure and reliable access to applications and data. Please let me know if you are interested in this position and send me the resumes to netra.s@twsol.com
Posted 1 month ago
7.0 - 12.0 years
8 - 14 Lacs
Mumbai
Work from Office
1. Extensive experience working in the NBFC and Banking industry, with a solid understanding of the unique security challenges faced by these sectors. 2. Proven track record of conducting Cyber security reviews and performing gap assessments to identify and mitigate potential security risks. 3. Strong knowledge of DPDP and GDPR regulations, with the ability to ensure compliance and protect sensitive data. 4. Familiarity with Regulatory circulars related to Information security, Cyber Security, and Data Privacy, and the ability to stay informed on the latest developments in this rapidly evolving field. 5. Possession of certifications such as CISA, CISSP, ITIL, and ISO27000, demonstrating a commitment to professional excellence and ongoing education. 6. Excellent communication skills, with the ability to effectively communicate security requirements and risks to stakeholders at all levels of the organization. 7. Strong analytical skills, with the ability to assess complex security issues and develop practical solutions to address them. 8. Experience in implementing security policies and procedures to protect critical assets and ensure the confidentiality, integrity, and availability of information. 9. Ability to work independently and as part of a team, with a collaborative and proactive approach to problem-solving. 10. Commitment to ongoing professional development and staying abreast of industry trends and best practices. 11. One of the key skills required for this role is the ability to stay updated on the latest developments in the field of Information Security. The ideal candidate should have a deep understanding of emerging threats and vulnerabilities, as well as knowledge of best practices for mitigating risks. 12. In addition to technical skills, strong communication and interpersonal skills are also essential for this role. The consultant will be required to work closely with various stakeholders, including senior management, to implement Information Security measures and policies effectively. 13. Furthermore, the successful candidate should have a track record of successfully completing projects on time and within budget. They should be detail-oriented, proactive, and independent, with the ability to work well under pressure.
Posted 1 month ago
6.0 - 10.0 years
10 - 20 Lacs
Gurugram
Work from Office
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role At Kyndryl, our Security Consultants are game-changers, constantly pushing the boundaries of what's possible and transforming the way our customers do business. We're looking for a talented individual who thrives in a dynamic environment and is ready to take on the challenge of protecting organizations from threats both known and unknown – being the defender of tomorrow’s digital world. As a Security Consultant, you'll be the guardian of confidentiality, integrity, and availability, ensuring organizations are shielded from the ever-evolving threat landscape. Your expertise will be sought after as you assess, analyze, and implement effective security measures in customer environments, leaving no stone unturned when it comes to safeguarding their most sensitive data. Collaboration will be your forte, as you work closely with clients to understand their unique security requirements and assess their current security posture. Armed with this knowledge, you'll provide expert guidance and recommendations on the best security practices, risk management strategies, and robust security policies that will fortify their defenses. You won't stop at providing advice; you'll roll up your sleeves and get hands-on. Designing and implementing security controls, policies, and procedures will be your playground. You'll work alongside cross-functional teams to deploy state-of-the-art technologies, including firewalls, intrusion detection/prevention systems, access controls, and encryption technologies, ensuring a comprehensive security framework. The thrill of uncovering vulnerabilities and risks is what motivates you. Armed with your extensive knowledge, you'll conduct thorough security assessments, leaving no stone unturned in identifying potential security breaches. Your findings will serve as the foundation for meticulous security audits and reviews, ensuring adherence to policies and procedures. Your reports and findings will be the catalyst for management decisions and actions. In the fast-paced world of cybersecurity, staying ahead of the game is crucial. That's why you'll continuously immerse yourself in the latest security threats, technologies, and best practices. Your recommendations will drive enhancements to the organization's security posture, ensuring it remains at the cutting edge of defense. Your influence won't be limited to systems alone. You'll lend your expertise to the design and review of IT infrastructure, systems, and applications, ensuring they are secure by design from inception. Not only will you make an impact within our organization, but you'll also collaborate with customers and vendors on security assessments, audits, and due diligence activities. Your knowledge and experience will be instrumental in shaping secure collaborations and partnerships. Our consultants are restless for innovation. They are at the edge of technology, changing the way our customers implement business solutions – so, if you’re a problem-solver, an innovative thinker, and a self-starter with a passion high impact assignments which align technology to business outcomes, then we want to hear from you! Apply today to join our team that has a host of exciting projects and customers waiting for you to work with them to solve complex transformation puzzles through technology. Your Future at Kyndryl As a Security Consultant at Kyndryl you will join the Kyndryl Consultant Profession, working with other Kyndryl Consultants, Architects, Project Managers, and cross-functional Technical Subject Matter Experts – presenting unlimited opportunities with unmatched support through our investment in your learning, training, and career growth Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Experience 5+ years in IT security profile. Education : MCA / B.E. / B. Tech Project Experience : Minimum of 3+ years in security requirements, cyber security, IT security audits, certifications, etc., in at least 2 IT projects Certifications : ISO 27001 & CISSP (Certified Information Systems Security Professional) Responsibilities Facilitate review of the data security architecture as per the requirements. Facilitate review of the configuration of the required IT security infrastructure as per the law or as requested by the client against the acceptance criteria. Monitor activities related to periodic security testing/audits as per client requirements. Implement any new or existing guidelines/policies/acts issued by the Government of India on IT Security. Location : Requires working from Client location in Delhi Preferred Technical and Professional Experience CISSP (Certified Information Systems Security Professional) certification. ISO 27001 Certification. Other relevant certifications like CISM (Certified Information Security Manager) or CEH (Certified Ethical Hacker) can be beneficial. Excellent communication skills to effectively interact with stakeholders and educate employees on security best practices. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 1 month ago
7.0 - 12.0 years
13 - 17 Lacs
Hyderabad
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityNow Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Engage with multiple teams and contribute on key decisions- Provide solutions to problems for their immediate team and across multiple teams- Lead security assessments and provide recommendations- Develop security architecture standards and guidelines- Conduct security reviews and audits Professional & Technical Skills: - Must To Have Skills: Proficiency in SailPoint IdentityNow- Strong understanding of cloud security principles- Experience in implementing security controls in cloud environments- Knowledge of identity and access management solutions- Hands-on experience with security architecture design- Familiarity with security compliance frameworks Additional Information:- The candidate should have a minimum of 7.5 years of experience in SailPoint IdentityNow- This position is based at our Hyderabad office- A 15 years full-time education is required Qualification 15 years full time education
Posted 1 month ago
5.0 - 10.0 years
13 - 17 Lacs
Pune
Work from Office
Project Role : Security Architect Project Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals. Must have skills : Application Security Architecture and Design Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the security architecture, ensuring that it meets the business requirements and performance goals. You will play a crucial role in safeguarding the organization's digital assets and ensuring data protection. Roles & Responsibilities:- Expected to be an SME, collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Lead security architecture design and implementation.- Conduct security assessments and audits.- Develop security policies and procedures.- Stay updated on the latest security trends and technologies. Professional & Technical Skills: - Must To Have Skills: Proficiency in Application Security Architecture and Design.- Strong understanding of cybersecurity principles.- Experience in threat modeling and risk assessment.- Knowledge of security frameworks such as ISO 27001 and NIST.- Hands-on experience with security tools and technologies. Additional Information:- The candidate should have a minimum of 5 years of experience in Application Security Architecture and Design.- This position is based at our Pune office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
8.0 - 12.0 years
13 - 17 Lacs
Hyderabad, Chennai
Work from Office
Job Details: Skill: Network Security Architect Experience: 8+ Years Notice Period: Immediate Joiners Employee type : C2H Key Responsibilities: The Network Security Architect is responsible for researching, designing and implementing secure business focused solutions that meet or exceed corporate policies and government mandates. This includes developing roadmap and migration strategies for existing architecture. Specific tasks include, but are not limited to the following: Research,design & advocate new technologies,architectures and security products that will support security requirements for the enterprise and its customers, Business partners and vendors. Meet other planners in the organization to translate Business needs into functional, available systems that deliver services quickly and conveniently while incorporating the right level of security, executing transition to relevant operations team. Work closely with enterprise architects,other functional area architects and specialists to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently,and to meet business objectives and regulatory requirements Practical understanding of cybersecurity frameworks. Strong Firewall knowledge ( IPSEC VPN,UTM/IPS,DoS Policy,SSL inspection) Ability to manage high impact Priority 1 incidents Strong Cloud Security/CASB/Web Proxy knowledge Cloud Solutions on-Prem Solutions Strong Remote Access technologies knowledge. Experience with managed devices-unmanaged devices/2FA/MFA solutions. Scripting skills Qualifications, Experience and Competency Requirements: Education: Bachelor's Degree in Information Technology or related Computer Science/Technical area Experience Essential: 8-10 years 5 years minimally of Network Security experience Firewall background 3 years minimally experience working in large organizations Firewall/Web Proxy/Remote Access/Cloud experience Strong technical Documentation skills Network Diagrams/Knowledge based articles Articulate Pragmatic Self-Aware Desirable: CISSP Certification CCNA other industry standard security certifications Cloud migration experience Fortigate Firewalls McAfee Web Gateways/ Pulse Secure Appliances Netskope Firemon Qradar Splunk FortiManager FortiAnalyzer Specific Skill Requirement Firewall/Web Proxy/Remote Access/Cloud experience Network Diagrams/Knowledge based articles.
Posted 1 month ago
8.0 - 13.0 years
15 - 27 Lacs
Chennai, Coimbatore
Work from Office
About the Role As a Sr. Information Security Officer, you'll join growing Global Corporate Security Office diverse international team bridging divisions, central services, and global entities. Ideal for career changers or early cybersecurity enthusiasts, this role offers a hands-on learning experience with room to grow. What Youll Do: Provide day-to-day operational security support, advising on policies, controls, and best practices. Analyze security queries across the organization and recommend mitigating or compensating solutions. Collaborate in developing and enhancing the Information Security Management System (ISMS) and policies. Drive continuous improvement of security processes and controls. Perform risk analysis, logging risk indicators, and ensuring effective follow-up. Act as a security advocate: deliver awareness training, and support project teams and management. Investigate and manage internal security incidents, ensuring timely resolution. Engage in diverse security initiatives based on your skills and interests. Conduct security induction sessions for new hires. What Youll Bring Bachelors or masters degree in a relevant fieldor equivalent practical experience. Excellent communication capabilities with both technical and business stakeholders (e.g., CISO, IT, engineering). Familiarity with frameworks like NIST or ISO 27001. CISSP and/or CISM certifications. Fluent in English (verbal and written)
Posted 1 month ago
9.0 - 14.0 years
9 - 19 Lacs
Bengaluru
Work from Office
We are seeking a highly experienced Cybersecurity Solutions Specialist to drive technical engagements and solution design for enterprise clients. This role combines strategic presales leadership with hands-on cybersecurity expertise, including L3 support, SOC operations, and threat intelligence. You will act as a trusted advisor to clients, guiding them through complex security challenges and aligning solutions with business needs. Lead technical discovery sessions and design tailored cybersecurity solutions. Deliver product presentations, demos, and Proof of Concepts (PoCs). Respond to RFPs/RFIs and develop comprehensive technical proposals. Evaluate new technologies, tools, and processes for inclusion in solution offerings. Manage and operate security tools including SIEM, IDS/IPS, EDR, DLP, and firewalls. Implement and maintain SOC and ISMS frameworks aligned with ISO 27001. Conduct threat intelligence analysis and stay updated on emerging threats. Perform vulnerability assessments, penetration testing, and system hardening. Analyze and respond to software/hardware vulnerabilities and security log data. Conduct security audits and document incident response procedures. Hands-on experience with EDR, Anti-Virus, Vulnerability Management, Forensics, and Encryption. Experience in cybersecurity presales, solution architecture, or consulting. Strong knowledge of security domains including: Network Security (Firewalls, IPS/IDS) Endpoint Security (EPP, EDR, XDR) Cloud Security (Azure, AWS, GCP) Identity & Access Management (IAM, PAM) Data Protection (DLP, encryption) Security Operations (SIEM, SOAR) Strong scripting skills (Python, PowerShell, Bash) for automation and analysis. Familiarity with MITRE ATT&CK framework and threat intelligence platforms. Experience in cybersecurity, including L3 support and presales roles. Advanced certifications preferred: CISSP, CISM, CEH, OSCP, GCIA, GCIH, CASP, CompTIA Security+ or vendor-specific certifications (e.g., Palo Alto, Fortinet, Microsoft Security). Strong understanding of cyber-attacks, threat vectors, risk management, and incident response. Flexible to work in 24x7 operations and rotational shifts.
Posted 1 month ago
10.0 - 15.0 years
11 - 15 Lacs
Bengaluru
Work from Office
FICO (NYSEFICO) is a leading global analytics software company, helping businesses in 100+ countries make better decisions. Join our world-class team today and fulfill your career potential! The Opportunity "As a part of FICOs highly modern and innovative analytics and decision platform, the Senior Software Security Engineer will help shape the next generation security for FICOs Platform. You will address cutting edge security challenges in a highly automated, complex, cloud & microservices driven environments inclusive of design challenges and continuous delivery of security functionality and features to the FICO platform as well as the AI/ML capabilities used on top of the FICO platform" VP of Engineering. What Youll Contribute Secure the design of next next-generation FICO Platform, its capabilities, and services. Provide full-stack security architecture design from cloud infrastructure to application features for FICO customers. Work closely with product managers, architects, and developers on implementing the security controls within products. Develop and maintain Kyverno policies for enforcing security controls in Kubernetes environments. Collaborate with platform, DevOps, and application teams to define and implement policy-as-code best practices. Contribute to automation efforts for policy deployment, validation, and reporting. Stay current with emerging threats, Kubernetes security features, and cloud-native security tools. Define required controls and capabilities for the protection of FICO products and environments. Build & validate declarative threat models in a continuous and automated manner. Prepare the product for compliance attestations and ensure adherence to best security practices. What Were Seeking 10+ years of experience in architecture, security reviews, and requirement definition for complex product environments. Strong knowledge and hands-on experience with Kyverno and OPA/Gatekeeper (optional but a plus). Familiarity with industry regulations, frameworks, and practices. For example, PCI, ISO 27001, NIST, etc. Experience in threat modeling, code reviews, security testing, vulnerability detection, attacker exploit techniques, and methods for their remediation. Hands-on experience with programming languages, such as Java, Python, etc. Experience in deploying services and securing cloud environments, preferably AWS. Experience deploying and securing containers, container orchestration, and mesh technologies (such as EKS, K8S, ISTIO). Experience with Crossplane to manage cloud infrastructure declaratively via Kubernetes. Certifications in Kubernetes or cloud security (e.g., CKA, CKAD, CISSP) are desirable. Proficiency with CI/CD tools (e.g., GitHub Actions, GitLab CI, Jenkins, Crossplane). Independently drive transformational security projects across teams and organizations. Experience with securing event streaming platforms like Kafka or Pulsar. Experience with ML/AI model security and adversarial techniques within the analytics domains. Hands-on experience with IaC (Such as Terraform, Cloudformation, Helm) and with CI/CD pipelines (such as Github, Jenkins, JFrog). Our Offer to You An inclusive culture strongly reflecting our core valuesAct Like an Owner, Delight Our Customers and Earn the Respect of Others. The opportunity to make an impact and develop professionally by leveraging your unique strengths and participating in valuable learning experiences. Highly competitive compensation, benefits and rewards programs that encourage you to bring your best every day and be recognized for doing so. An engaging, people-first work environment offering work/life balance, employee resource groups, and social events to promote interaction and camaraderie. Why Make a Move to FICO At FICO, you can develop your career with a leading organization in one of the fastest-growing fields in technology today Big Data analytics. Youll play a part in our commitment to help businesses use data to improve every choice they make, using advances in artificial intelligence, machine learning, optimization, and much more. FICO makes a real difference in the way businesses operate worldwide Credit Scoring FICO Scores are used by 90 of the top 100 US lenders. Fraud Detection and Security 4 billion payment cards globally are protected by FICO fraud systems. Lending 3/4 of US mortgages are approved using the FICO Score. Global trends toward digital transformation have created tremendous demand for FICOs solutions, placing us among the worlds top 100 software companies by revenue. We help many of the worlds largest banks, insurers, retailers, telecommunications providers and other firms reach a new level of success. Our success is dependent on really talented people just like you who thrive on the collaboration and innovation thats nurtured by a diverse and inclusive environment. Well provide the support you need, while ensuring you have the freedom to develop your skills and grow your career. Join FICO and help change the way business thinks! Learn more about how you can fulfil your potential at www.fico.com/Careers FICO promotes a culture of inclusion and seeks to attract a diverse set of candidates for each job opportunity. We are an equal employment opportunity employer and were proud to offer employment and advancement opportunities to all candidates without regard to race, color, ancestry, religion, sex, national origin, pregnancy, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. Research has shown that women and candidates from underrepresented communities may not apply for an opportunity if they dont meet all stated qualifications. While our qualifications are clearly related to role success, each candidates profile is unique and strengths in certain skill and/or experience areas can be equally effective. If you believe you have many, but not necessarily all, of the stated qualifications we encourage you to apply. Information submitted with your application is subject to theFICO Privacy policy at https://www.fico.com/en/privacy-policy
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough