Jobs
Interviews

1451 Cloud Security Jobs - Page 9

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

15.0 - 20.0 years

13 - 17 Lacs

Gurugram

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Operation Automation Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and transitioning to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud technologies and security threats. Roles & Responsibilities:1)Design and implement Microsoft Sentinel architecture, including data connectors, analytics rules, and workbooks.2)Integrate Sentinel with various data sources, including Azure services on-premises systems, and third-party security products.3)Develop and maintain data connectors, APIs and custom integrations.4)Configure and optimize incident response workflows, including automated response actions and playbooks.5)Collaborate with security operations teams to implement Sentinel-based security monitoring and incident response processes.6)Provide training and support to security teams on Sentinel features and functionality7)Continuously monitor and optimize Sentinel performance, scalability, and reliability8)Develop and maintain custom dashboards, reports, and workbooks to provide security insights and metrics. 9)Integrate Azure Logic Apps with Azure Sentinel to automate security workflows and incident response.10)Develop custom connectors for Logic apps to integrate with Azure Sentinel and other security tools. 11)Collaborate with security teams, developers, and operation teams to ensure seamless integration and deployment of Logic Apps with Azure Sentinel12)Configure and maintain Sentinel workspaces, including data connectors, analytics rules. 13)Optimize Sentinel workspace performance, scalability, and security.14)Develop and maintain reports and dashboards to provide visibility into security metrics and trends.15)Strong knowledge of KQL and experience writing complex queries.- Proficiency in Microsoft Sentinel, Azure Security Center and Azure Monitor- Experience with data analytics, machine learning, and threat intelligence. Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Develop and maintain comprehensive documentation of security architecture and frameworks.- Conduct regular assessments and audits to ensure compliance with security policies and standards. Professional & Technical Skills: - Must To Have Skills: Proficiency in Azure Sentinel & KQL.- Strong understanding of cloud security principles and best practices.- Experience with security incident response and management.- Familiarity with security compliance frameworks such as ISO 27001, NIST, or CIS.- Knowledge of automation tools and scripting languages to enhance security operations. Additional Information:- The candidate should have minimum 5 years of experience in Security Operation Automation.- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply

6.0 - 9.0 years

8 - 11 Lacs

Pune

Work from Office

Job Title: ITAO ( IT Application Owner ) AVP Location: Pune, India ITAO is the custodian of the application and is responsible to apply and enable during Life-Cycle of the application the IT policies and procedures with specific consideration to IT management and Information Security. The ITAO ensures a clear separation of the responsibility within the project, aimed at achieving a safe and secure running of the application and compliance to regulations, policies and standards. ITAO is responsible for application documentation, application infrastructure reliability and compliance, and is usually the IT SPOC for audit initiatives. Best in class leave policy Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Flexible working arrangements Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Strategy & Architecture Enterprise IT governance: Reviews current and proposed information systems for compliance with the organisation's obligations (including legislation, regulatory, contractual and agreed standards/policies) and adherence to overall strategy. Provides specialist advice to those accountable for governance to correct compliance issues. Cloud Security & Governance : Migration on Cloud from on-prem setup end to end with ensuring application/infrastructure and Data Security Information security: Communicates information security risks and issues to business managers and others. Performs basic risk assessments for small information systems. Contributes to vulnerability assessments. Applies and maintains specific security controls as required by organisational policy and local risk assessments. Investigates suspected attacks. Responds to security breaches in line with security policy and records the incidents and action taken. Information content publishing: Understands technical publication concepts, tools and methods and the way in which these are used. Uses agreed procedures to publish content. Obtains and analyses usage data and presents it effectively. Understands, and applies principles of usability and accessibility to published information. Specialist advice: Actively maintains knowledge in one or more identifiable specialisms. Provides detailed and specific advice regarding the application of their specialism(s) to the organisation's planning and operations. Recognises and identifies the boundaries of their own specialist knowledge. Collaborates with other specialists, where appropriate, to ensure advice given is appropriate to the needs of the organisation. Knowledge management: Maintains knowledge management systems and content to meet business needs. Supports others to enable them to complete knowledge management activities and form knowledge management habits. Reports on progress of knowledge management activities. Configures and develops knowledge management systems and standards. Supports changes to work practices to support capture and use of knowledge. Business risk management: Investigates and reports on hazards and potential risk events within a specific function or business area. Continuity management: Implements and contributes to the development of a continuity management plan. Coordinates the assessment of risks to the availability, integrity and confidentiality of systems that support critical business processes. Coordinates the planning, designing, and testing of maintenance procedures and contingency plans. Data management: Assists in providing accessibility, retrievability, security and protection of data in an ethical manner. Methods and tools: Provides support on the use of existing method and tools. Configures methods and tools within a known context. Creates and updates the documentation of methods and tools. To maintain the Information Security related documentation of assigned IT Assets in the DB Group IT Asset inventory. Change and Transformation Requirements definition and management: Assists in the definition and management of requirements. Uses standard techniques to elicit, specify, and document requirements for simple subject areas with clearly-defined boundaries. Assists in the creation of a requirements baseline and in investigating and applying authorised requests for changes to base-lined requirements, in line with change management policy. Delivery and operation Availability management: Contributes to the availability management process and its operation and performs defined availability management tasks. Analyses service and component availability, reliability, maintainability and serviceability. Ensures that services and components meet and continue to meet all of their agreed performance targets and service levels. Implements arrangements for disaster recovery and documents recovery procedures. Conducts testing of recovery procedures. Service acceptance: Engages with project management to confirm that products developed meet the service acceptance criteria and are to the required standard. Feeds into change management processes. Configuration management: Applies tools, techniques and processes to track, log and correct information related to configuration items. Verifies and approves changes ensuring protection of assets and components from unauthorised change, diversion and inappropriate use. Ensures that users comply with identification standards for object types, environments, processes, lifecycles, documentation, versions, formats, baselines, releases and templates. Performs audits to check the accuracy of information and undertakes any necessary corrective action under direction. Asset management: Applies tools, techniques and processes to create and maintain an accurate asset register. Produces reports and analysis to support asset management activities and aid decision making. Change management: Develops implementation plans for complex requests for change. Evaluates risks to the integrity of service environment inherent in proposed implementations (including availability, performance, security and compliance of the business services impacted). Seeks authority for those activities, reviews the effectiveness of change implementation, and suggests improvement to organisational procedures governing change management. Leads the assessment, analysis, development, documentation and implementation of changes based on requests for change. Security administration: Investigates minor security breaches in accordance with established procedures. Assists users in defining their access rights and privileges. Performs non-standard security administration tasks and resolves security administration issues. Application support: Drafts and maintains procedures and documentation for applications support. Manages application enhancements to improve business performance. Advises on application security, licensing, upgrades, backups, and disaster recovery needs. Ensures that all requests for support are dealt with according to set standards and procedures. Problem management: Ensures that appropriate action is taken to anticipate, investigate and resolve problems in systems and services. Ensures that such problems are fully documented within the relevant reporting system(s). Enables development of problem solutions. Coordinates the implementation of agreed remedies and preventative measures. Analyses patterns and trends. To support key role holders such as ITAOs and ISOs to develop a secure environment by evaluating the IT Security requirements as early as possible in the system development life cycle to select the applicable information security controls for implementation. To guide ITAOs on the implementation of compensating controls in case of deviations from the applicable information security controls. To approve the access control and user authorization approach of the assigned IT Assets. To execute and document periodical recertification of Access Rights in compliance with the DB Group Identity and Access Processes. Incident management: Ensures that incidents are handled according to agreed procedures. Investigates escalated incidents to responsible service owners and seeks resolution. Facilitates recovery, following resolution of incidents. Ensures that resolved incidents are properly documented and closed. Analyses causes of incidents, and informs service owners in order to minimise probability of recurrence, and contribute to service improvement. Analyses metrics and reports on performance of incident management process. Your skills and experience Experience 6 to 9 years IT Service Management, IT Governance or IT Project Management background. Excellent communication and presentation skills, highly organized and disciplined. Experienced in working with multiple stakeholders. Ability to create and naturally maintain good business relationships with all stakeholders. Comfortable working in VUCA (Volatility Uncertainty Complexity Ambiguity) and highly dynamic environments. Rounded knowledge and experience of all the following Information Security processes; Application and Infrastructure Security Identity and Access management Information Security Incident and Problem Management Information Security Governance for business and technology Information Security Risk Management Expert knowledge of DB Information Security Principles, Policies, and Procedures Profound experience in business and IT processes and respective Information Security requirements. Extensive experience with financial markets and institutions. Excellent analytical skills, flexibility regarding problem solving. Ability to work in fast paced environment and keep pace with technical/ operational innovation. Open minded, able to share information, transfer knowledge and expertise to team members. Keeps pace with technical/operational innovation & maintains understanding of the CIO technologies, as well as CISO service and technology offerings ITAO will typically have a rather limited technical hands on involvement. A high-level understanding on the products/technologies below is welcomed: Databases: mainly Oracle Application/web servers (like J2EE based, especially JBoss, Tomcat, WebLogic Server, Apache) Management of security certificates. Unix servers very basic administration Microservices and SOA Communication and encryption protocols (mainly HTTP(S), SSL) Networking (firewalls, load balancers, etc) High Availability Architecture. Reasonable understanding and relevant experience in Agile-Scrum delivery and main tools (Jira & Confluence); 4-5 years of work experience in IT; 2-3 years project management or application owner experience. Preferable skills: Experience working with distributed development teams; Experience in finance products Experience on Google Cloud Security and Management Degree in Information Security or a comparable education In addition, the following education/certification attainment will be beneficial: CISSP (Certified Information Systems Security Professional) or equivalent. ISSMP (Information Systems Security Management Professional). CISM (Certified Information Security Manager) or equivalent Skills and quality Quality assurance: Contributes to the collection of evidence and the conduct of formal audits or reviews of activities, processes, data, products or services. Examines records for evidence that appropriate testing and other quality control activities have taken place and determines compliance with organisational directives, standards and procedures. Identifies non-compliances, non-conformances and abnormal occurrences. Conformance review: Collects and collates evidence as part of a formally conducted and planned review of activities, processes, products or services. Examines records as part of specified testing strategies for evidence of compliance with management directives, or the identification of abnormal occurrences. Digital forensics: Contributes to digital forensic investigations. Processes and analyses evidence in line with policy, standards and guidelines and supports production of forensics findings and reports. To contribute to the Information Security Incident Management Process in the case of a security breach for their IT-Assets, if requested. Relationships and engagement Relationship management: Identifies the communications and relationship needs of stakeholder groups. Translates communications/stakeholder engagement strategies into specific activities and deliverables. Facilitates open communication and discussion between stakeholders, acting as a single point of contact by developing, maintaining and working to stakeholder engagement strategies and plans. Provides informed feedback to assess and promote understanding. Facilitates business decision-making processes. Captures and disseminates technical and business information. Experience/Exposure Autonomy: Works under general direction. Uses discretion in identifying and responding to complex issues and assignments. Receives specific direction, accepts guidance and has work reviewed at agreed milestones. Determines when issues should be escalated to a higher level. Influence : Interacts with and influences colleagues. Has working level contact with customers, suppliers and partners. May supervise others or make decisions whichimpactthe work assigned to individuals or phases of projects. Understands and collaborates on the analysis of user/customer needs and represents this in their work. Complexity: Performs a range of work, sometimes complex and non-routine, in a variety of environments. Applies methodical approach to issue definition and resolution. Knowledge: Has a sound generic, domain and specialist knowledge necessary to perform effectively in the organization typically gained from recognized bodies of knowledge and organizational information. Demonstrates effective application of knowledge. Has an appreciation of the wider business context. Takes action to develop own knowledge. Business skills: Demonstrates effective communication skills. Plans, schedules and monitors own work (and that of others where applicable) competently within limited deadlines and according to relevant legislation, standards and procedures. Contributes fully to the work of teams. Appreciates how own role relates to other roles and to the business of the employer or client. Demonstrates an analytical and systematic approach to issue resolution. Takes the initiative in identifying and negotiating appropriate personal development opportunities. Understands how own role impacts security and demonstrates routine security practice and knowledge required for own work. Cloud Migration and Understanding : Basic Knowledge on IaaS/PaaS/SaaS and migration from different environments to Cloud

Posted 1 week ago

Apply

6.0 - 10.0 years

0 - 0 Lacs

mumbai city

On-site

Education- B.E./B.Tech/MCA in Computer Science Experience- At least 6+ years of experience in cloud infrastructure engineering, with a focus on Google Cloud Platform (GCP). Job Description Design, implement, and manage Google Cloud infrastructure solutions, including compute, storage, networking, and security services. Automate infrastructure provisioning and management using tools such as Terraform, Ansible, or Cloud Deployment Manager. Monitor system performance and troubleshoot issues, implementing proactive measures to prevent outages. Implement and maintain security best practices within the Google Cloud environment. Collaborate with development teams to design and implement cloud-native applications. Optimize infrastructure costs and resource utilization. Participate in on-call rotation for incident response. Stay up-to-date with the latest Google Cloud technologies and trends. Contribute to the development of infrastructure standards and best practices. Create and maintain comprehensive documentation of infrastructure configurations and procedures. Identify potential weak points in the infrastructure and systems and create effective mitigation plans. Oversee the process of implementing solutions or services with an aim for minimal downtime. Create and own scaling, capacity planning, configuration management, and monitoring of processes and procedures. Ensure there is thorough monitoring coverage. Preferred Skills/Knowledge Strong understanding of cloud computing concepts and technologies. Experience with infrastructure-as-code tools such as Terraform or Cloud Deployment Manager. Proficiency in scripting languages such as Python or Bash. Experience with containerization and orchestration technologies such as Docker and Kubernetes. Solid understanding of networking concepts, including VPCs, subnets, routing, and firewalls. Experience with monitoring and logging tools such as Cloud Monitoring and Cloud Logging. Experience with Linux system administration. Strong problem-solving and troubleshooting skills. Excellent communication and collaboration skills. Preferred Certification Google Cloud certifications (e.g., Professional Cloud Architect, Professional Cloud Network Engineer). Experience migrating applications and services to Google Cloud. Experience with CI/CD pipelines. Experience with security concepts such as encryption, identity management, and access control. Experience with big data and machine learning frameworks. Experience in a technical leadership role.

Posted 1 week ago

Apply

6.0 - 10.0 years

0 - 0 Lacs

mumbai city

On-site

Education- B.E./B.Tech/MCA in Computer Science Experience- At least 6+ years of experience Configuration and Administration of complex cloud Network. Job Description Implementation and deployment of cloud-based solutions Public Cloud (GCP) such as IG (Instant Group) creation, VPC peering, WAF Cloud Armour Policy deployment, Google native LB and NVA (Network Virtual Appliances) configuration / deployment in Cisco FTD and Citrix LBs. SSL certificate renewal, Firewall port opening in GCP Cloud. Cloud interconnect, Network troubleshooting between on-Premises network infrastructure and Google cloud and ISP circuits coordination and liasioning with external ISP teams. Configuration and Administration of Routing and switching. Configuration and Administration of Cisco routers Aggregation switches (Nexus switches), TOR switches, Load balancers (Citrix and F5)and Firewall (Cisco FMC-FTD, ASA). Provide technical leadership and guidance to project teams and stakeholders. Act as a SPOC for BAVA scanning and remediation procedure and closely work with InfoSec team. Strong understanding of TCP/IP , DNS, SSL/ TLS, NTP & DHCP Attend & quickly resolve priority P1 incident call. Attend the CAB meeting to get approve major change. Participate in internal or external Network audit Ensure solutions meet business requirements and are scalable, highly available, and cost-effective. Conduct Interview of L2 & L3 network resources. Provide third-level support and provide root cause analysis of issues. Provide quick network solution & Capacity Planning. Having good understanding of Network Automation, Having good knowledge on Automation language python/Ansible. Collaborate with cross-functional teams, including developers, infrastructure engineers, and business stakeholders. Provide guidance and recommendations on cloud-related technologies and trends. Work with customers to understand their requirements and develop customized cloud solutions. Ensure solutions are secure, compliant, and meet regulatory requirements. Establish engineering and automation objectives Consult with internal IT customers on net new and cloud migration initiatives. Maintain security standards in cloud per Security guideline and benchmarks Preferred Skills/Knowledge Strong knowledge on Citrix Netsclaer , SDX, MPX, VPX or VM base Load balancers or F5 Loadbalancer Hands on Experience Cisco Nexus platform 9K, 7K, 5K, 2K Fabric extender switches . Strong knowledge of VPC, VDC, STP, Port-channel, VLAN Experience on Routing protocol BGP, OSPF, VRF, VX LAN Strong Experience on Cisco ASA Firewall, FTD , FMC Experience on cloud platform , GCP will be preferred. Excellent communication and collaboration skills. Ability to work independently and as part of a team. Strong analytical and problem-solving skills. Certifications CCNP/CCIE/CCSP, GCP, Any Citrix LB Certification.

Posted 1 week ago

Apply

10.0 - 12.0 years

11 - 15 Lacs

Ahmedabad

Work from Office

About the Role : We are seeking an experienced and highly skilled Senior AWS Engineer with over 10 years of professional experience to join our dynamic and growing team. This is a fully remote position, requiring strong expertise in serverless architectures, AWS services, and infrastructure as code. You will play a pivotal role in designing, implementing, and maintaining robust, scalable, and secure cloud solutions. Key Responsibilities : - Design & Implementation : Lead the design and implementation of highly scalable, resilient, and cost-effective cloud-native applications leveraging a wide array of AWS services, with a strong focus on serverless architecture and event-driven design. - AWS Services Expertise : Architect and develop solutions using core AWS services including AWS Lambda, API Gateway, S3, DynamoDB, Step Functions, SQS, AppSync, Amazon Pinpoint, and Cognito. - Infrastructure as Code (IaC) : Develop, maintain, and optimize infrastructure using AWS CDK (Cloud Development Kit) to ensure consistent, repeatable, and version-controlled deployments. Drive the adoption and implementation of CodePipeline for automated CI/CD. - Serverless & Event-Driven Design : Champion serverless patterns and event-driven architectures to build highly efficient and decoupled systems. - Cloud Monitoring & Observability : Implement comprehensive monitoring and observability solutions using CloudWatch Logs, X-Ray, and custom metrics to proactively identify and resolve issues, ensuring optimal application performance and health. - Security & Compliance : Enforce stringent security best practices, including the establishment of robust IAM roles and boundaries, PHI/PII tagging, secure configurations with Cognito and KMS, and adherence to HIPAA standards. Implement isolation patterns and fine-grained access control mechanisms. - Cost Optimization : Proactively identify and implement strategies for AWS cost optimization, including S3 lifecycle policies, leveraging serverless tiers, and strategic service selection (e.g., evaluating Amazon Pinpoint vs. SES based on cost-effectiveness). - Scalability & Resilience : Design and implement highly scalable and resilient systems incorporating features like auto-scaling, Dead-Letter Queues (DLQs), retry/backoff mechanisms, and circuit breakers to ensure high availability and fault tolerance. - CI/CD Pipeline : Contribute to the design and evolution of CI/CD pipelines, ensuring automated, efficient, and reliable software delivery. - Documentation & Workflow Design : Create clear, concise, and comprehensive technical documentation for architectures, workflows, and operational procedures. - Cross-Functional Collaboration : Collaborate effectively with cross-functional teams, including developers, QA, and product managers, to deliver high-quality solutions. - AWS Best Practices : Advocate for and ensure adherence to AWS best practices across all development and operational activities. Required Skills & Experience : of hands-on experience as an AWS Engineer or similar role. - Deep expertise in AWS Services : Lambda, API Gateway, S3, DynamoDB, Step Functions, SQS, AppSync, CloudWatch Logs, X-Ray, EventBridge, Amazon Pinpoint, Cognito, KMS. - Proficiency in Infrastructure as Code (IaC) with AWS CDK; experience with CodePipeline is a significant plus. - Extensive experience with Serverless Architecture & Event-Driven Design. - Strong understanding of Cloud Monitoring & Observability tools : CloudWatch Logs, X-Ray, Custom Metrics. - Proven ability to implement and enforce Security & Compliance measures, including IAM roles boundaries, PHI/PII tagging, Cognito, KMS, HIPAA standards, Isolation Pattern, and Access Control. - Demonstrated experience with Cost Optimization techniques (S3 lifecycle policies, serverless tiers, service selection). - Expertise in designing and implementing Scalability & Resilience patterns (auto-scaling, DLQs, retry/backoff, circuit breakers). - Familiarity with CI/CD Pipeline Concepts. - Excellent Documentation & Workflow Design skills. - Exceptional Cross-Functional Collaboration abilities. - Commitment to implementing AWS Best Practices.

Posted 1 week ago

Apply

4.0 - 8.0 years

0 Lacs

maharashtra

On-site

As a highly organized Cybersecurity Officer at AmeriPharma, you will play a crucial role in managing system-wide healthcare compliance, information security, and privacy regulations. Reporting to the Director of Regulatory Affairs, you will be responsible for ensuring regulatory excellence, information security, and adherence to federal and state laws. Your primary focus will be on fostering a culture of accountability, trust, and risk management across all IT infrastructures. Your duties will involve developing and managing a comprehensive cybersecurity program in compliance with regulations such as HITECH, providing cybersecurity support during software and network development, conducting security and risk assessments, and managing annual risk assessments, vulnerability management, and penetration testing. You will also be responsible for implementing security measures, overseeing compliance with patient data protection regulations, and managing cyber threats, incident response, and forensic investigations. To be successful in this role, you must have expertise in HIPAA, HITECH, HITRUST, and cybersecurity frameworks, along with extensive experience in risk management, information security, and regulatory compliance auditing. Strong technical knowledge in network security, cloud security, and identity access management is essential, as well as exceptional communication skills and the ability to make strategic, data-driven decisions in high-pressure environments. You will collaborate with IT teams to improve security controls across cloud, network, and endpoints, lead cybersecurity awareness training programs for employees, align cybersecurity initiatives with business objectives, and innovate in cybersecurity frameworks, AI-driven threat detection, and cloud security. Additionally, you will engage with industry leaders and regulatory bodies on emerging cybersecurity threats and develop and test software applications using Agile methodologies. The ideal candidate will have a Bachelor's degree in Computer Science, Information Technology, or a related field, along with certifications such as CompTIA A+, Network+, CISSP, CCNA, MSCE, or MCSD. A minimum of 4 years of experience in Engineering, Software Engineering, or related fields is required, as well as proficiency in cybersecurity tools and platforms. If you are passionate about cybersecurity, have a strong background in regulatory compliance and risk management, and are looking for a challenging and rewarding opportunity to make a difference in healthcare IT security, we invite you to join our dynamic team at AmeriPharma.,

Posted 1 week ago

Apply

7.0 - 11.0 years

0 Lacs

pune, maharashtra

On-site

Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! We are looking for a highly skilled and motivated Lead Security Engineer to join our Vulnerability Detection Signature Research team. In this role, you will take charge of researching, developing, and delivering vulnerability detection signatures for our scanning products. You will oversee and resolve vulnerability scanning and detection issues that impact our customers, leading the sustenance research team to ensure expert handling of customer concerns and managing escalations. Collaboration with cross-functional teams will be key to resolving complex challenges. This position demands a strong technical foundation in vulnerability management, scanning tools, and security best practices, along with proven leadership experience in managing teams and addressing customer-facing escalations. Lead the development, implementation, and continuous improvement of vulnerability detections and scanning processes for customers. Lead and manage customer calls and meetings, ensuring that all issues are clearly understood and effectively addressed. Investigate, analyze, and troubleshoot vulnerability detection issues reported by customers, then modify the code to resolve these problems. Build automation for day-to-day tasks. As a Lead Security Signature Engineer, you will also dedicate time to staying up-to-date with the latest vulnerabilities, attacks, and countermeasures. Coordinate team tasks, assign priorities, and ensure timely resolution of customer issues. Externalize research by writing blog posts, presenting at security conferences, etc. As a Lead Security Signature Engineer, you would also work alongside information security engineers to execute internal projects. Qualifications: - 7+ years of industry experience in network and systems security - Proven experience in leading and mentoring teams in a technical environment - Demonstrated experience with vulnerability scanning tools and vulnerability management processes - In-depth knowledge of protocols such as TCP/IP, HTTP, FTP, SSH and SSL - Strong understanding of common security vulnerabilities (e.g., OWASP Top 10, CVEs, etc.) and their remediation - Experience with scripting languages, including Python and Bash - Experience with network analysis tools, analysis of packet captures - Proficient with regular expressions - Ability to shift priorities as needed and demanded by the customer requirements - System administrator experience on Windows or Unix platforms - Strong understanding of VPN, Firewalls, Intrusion detection systems (IDS) - Proven ability to manage customer escalations and deliver effective solutions under pressure - Excellent written and verbal communication skills Additional Plus Competencies: - Understanding of Lua (preferred), Java - Knowledge of Virtualization software (VMWare, Virtual PC/Virtual Box, XEN, etc) - Experience in cloud security (AWS, Azure, GCP) and containerized environments (Docker, Kubernetes) - Able to handle projects independently - Experience in developing security-related tools/programs - OSCP, CISSP or SANS GIAC certifications,

Posted 1 week ago

Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

The Presales Consultant for Cybersecurity at Gruve plays a crucial role in supporting the sales team by leveraging technical expertise and insights to recommend cybersecurity solutions and services during the pre-sales phase. This position necessitates a profound understanding of security technologies, MSSP offerings, exceptional communication capabilities, and the knack to establish trust with clients through technical consultancy and guidance. Your primary responsibilities will involve collaborating with the sales team to identify clients" security needs and propose suitable technical solutions and services. You will be accountable for conducting detailed technical presentations, workshops, and demos on various security technologies like XDR, NDR, SSE, NAC, WAF, Cisco Hypershield, and Cisco data center services. Moreover, you will be tasked with designing tailored security architectures based on clients" specific environments, challenges, and business objectives. Furthermore, you will engage with clients regularly to grasp their security requirements, objectives, and landscapes. It will be imperative to document meeting notes, action items, and share them with internal and external stakeholders. Additionally, you will be responsible for analyzing risks by considering regulatory and compliance requirements and providing guidance on security best practices and technology adoption to foster robust client relationships. As a Presales Consultant, you must exhibit proficiency in designing comprehensive cybersecurity solutions and services that cater to customer needs while integrating seamlessly with existing infrastructures where necessary. Your collaboration with internal teams will ensure that proposed solutions align with the company's technical capabilities and are scalable and feasible. You will also be expected to maintain awareness of technology trends, emerging threats, and new cybersecurity and network technologies, educating the sales team on market opportunities and supporting them effectively. Moreover, you will actively participate in proposal development and respond to Request for Proposals (RFPs) and Request for Information (RFIs) from potential customers. Your role will involve collaborating with various teams to ensure technical accuracy, relevance, and compliance with customer requirements. The ideal candidate for this role should hold a B.E/B.Tech or Masters in Cybersecurity with a minimum of 5 years of experience in cybersecurity pre-sales, consulting, or technical advisor roles. Possessing relevant certifications such as CCIE, CISSP, CISM, CEH, or vendor-specific certifications will be advantageous. Additionally, experience in cloud security and network technologies like Routing, Switching, Wireless, Load Balancers will be beneficial. A techno-commercial approach, a drive for growth, and integrity are essential attributes for this position. Preferred qualifications include a profound understanding of security architecture, risk assessment methodologies, cybersecurity principles, tools, and frameworks. Experience with security vendors and products, knowledge of network security, cloud security, data security, and compliance standards will also be valuable. Exceptional communication, presentation, and interpersonal skills are vital for this role, along with the ability to convey technical concepts to non-technical stakeholders effectively and build enduring client relationships as a trusted advisor.,

Posted 1 week ago

Apply

5.0 - 9.0 years

0 Lacs

hyderabad, telangana

On-site

As a Lead Cloud Engineer at Providence, you will play a crucial role in designing, implementing, and managing cloud solutions that align with Providences's mission of delivering high-quality healthcare. Your responsibilities will include leading a team of engineers, ensuring the security and efficiency of the cloud infrastructure, and collaborating with various departments to drive cloud initiatives. In this role, you will develop and execute cloud architecture strategies that are in line with Providence's goals, ensuring robust and scalable solutions. You will lead, mentor, and support a team of cloud engineers, fostering a culture of collaboration and continuous improvement. Monitoring cloud resources, implementing security protocols to safeguard sensitive healthcare data, and integrating cloud solutions with IT, DevOps, and application development teams will also be part of your responsibilities. The ideal candidate for this position is a highly skilled professional with 5 to 8 years of experience in cloud engineering, particularly in designing and managing complex cloud infrastructures, preferably in the healthcare sector. Proficiency in major cloud platforms such as AWS, Azure, Google Cloud, along with a deep understanding of cloud architecture, microservices, and containerization (Docker, Kubernetes) is essential. Strong leadership skills, analytical mindset, excellent interpersonal and communication skills, and a passion for staying updated with emerging technologies are key qualities we are looking for in our Lead Cloud Engineer. If you are a visionary leader with a strong background in cloud technologies and a desire to contribute to the transformation of the healthcare ecosystem, we encourage you to apply for this exciting opportunity at Providence India.,

Posted 1 week ago

Apply

3.0 - 7.0 years

0 Lacs

maharashtra

On-site

As the Lead Security Engineer, you will play a pivotal role in ensuring the confidentiality, integrity, and availability of sensitive data across our systems. You will lead our data security strategy and execution, driving initiatives to mitigate risks and protect our data from evolving cyber threats. In this role, you will work closely with cross-functional teams, including engineering, compliance, and operations, to implement best practices for data protection and compliance with relevant industry regulations, such as GDPR, CCPA, PCI-DSS, and others. Lead Data Security Strategy: Develop and execute a comprehensive data security strategy aligned with the company's business objectives and regulatory requirements. Design and implement robust data protection frameworks, including encryption, data masking, tokenization, and data loss prevention (DLP) systems. Conduct regular risk assessments to identify data vulnerabilities and recommend and implement appropriate mitigation strategies to safeguard sensitive financial data. Ensure compliance with all applicable data security regulations and standards (GDPR, PCI-DSS, SOC 2, etc.) and manage audits and assessments. Lead efforts for investigating and responding to data security incidents, including data breaches, leaks, or unauthorized access events. Work closely with product, engineering, and IT teams to integrate security best practices into the software development lifecycle (SDLC) and cloud infrastructure. Design secure data architectures that support scalable, high-performance systems while minimizing exposure to data breaches. Lead, mentor, and grow a team of data security engineers, fostering a culture of continuous learning and improvement. Provide security awareness training to internal teams, educating them on the latest data security threats, trends, and best practices. Assess third-party vendors" security posture and collaborate on securing data exchanges with partners and clients. Implement monitoring systems to detect data security threats and provide regular reporting on the organization's data security posture to senior leadership. Qualifications: - Experience: 7+ years of experience in data security, with at least 3 years in a leadership or senior role within a fintech or similar regulated environment. - Technical Expertise: Strong knowledge of data encryption technologies, cloud security (AWS, Azure, GCP), data loss prevention (DLP), identity and access management (IAM), and security protocols (e.g., TLS, VPNs). - Regulatory Knowledge: In-depth understanding of data security regulations and standards (GDPR, CCPA, PCI-DSS, SOC 2, etc.) and experience leading compliance efforts. - Risk Management: Proven experience conducting risk assessments, threat modeling, and implementing mitigation strategies in a highly regulated environment. - Incident Response: Hands-on experience leading data breach investigations and managing data security incidents from identification to resolution. - Leadership Skills: Strong leadership, mentoring, and team-building capabilities, with a proven ability to drive cross-functional collaboration. - Problem-Solving & Analytical Thinking: Excellent analytical and troubleshooting skills with a strong attention to detail. - Certifications: CISSP, CISM, CISA, or other relevant certifications are highly desirable. Preferred Qualifications: - Experience with DevSecOps practices, security automation, and CI/CD pipeline integration. - Familiarity with advanced threat detection technologies like SIEM, EDR, and SOAR platforms.,

Posted 1 week ago

Apply

6.0 - 10.0 years

7 - 11 Lacs

Pune

Work from Office

The role involves supporting the end to end Security Technical Assessment service. The security Technical Assessments service helps defend KPMG and its clients by ensuring Security Technical assessments of KPMG information assets are performed and pro-actively driving findings and remediations in conjunction with Enterprise wide and Technology engineering teams, in alignment with KPMG risk objectives. The Security Technical Assessment Analyst will: Work collaboratively with internal stakeholders and external 3rd parties to perform security technical configuration reviews, perform security technical assessments, support the delivery of security testing across the software development lifecycle on technology solutions services, support the completion of Red Team exercises, proactively manage the end to end penetration testing process for technology solutions, review any technical security exception requests, providing recommendations and documenting findings and actions and provide risk-based pragmatic technical security advice and recommendations; Maintain good relationships with internal stakeholders and ensure customer satisfaction, by delivering quality service and escalation of issues as necessary; Influence colleagues to drive technical remediation in a collaborative manner in line with KPMG risk appetite; Identify and drive security technical assessments service improvements, especially using automation. Provide advice to security technical assessments service owner on ways to improve control mechanisms, identify, evaluate, and mitigate risks, Attend and support internal and external audits from a security technical assessments service perspective; Support investigations and resolutions of security problems to find a root cause and find a balanced outcome; Provide analysis on trends and proactively highlight issues and areas of concern; Create any required documentation to support the security technical assessment conducted; Maintain and update service documentation, such as process guides; Assist with reporting to leadership and other service stakeholders on service performance (against KPIs) and risk exposure (against KRIs). Input to development of security technical assessments standards and security policies; Work towards and achieve or extend professional certifications as part of personal development.

Posted 1 week ago

Apply

4.0 - 9.0 years

10 - 20 Lacs

Ahmedabad

Work from Office

- We are seeking an experienced Incident Response Lead to oversee and manage security incidents across the organization. - This role involves leading a team of 34 analysts, coordinating investigations, containment, recovery efforts and driving continuous improvements in our incident response processes and threat detection capabilities. Preferred candidate profile - Candidate should have 5-7 years in cybersecurity roles, with at least 3-4 years in incident detection and response and 2-3 years in team leadership or project management. - Translate technical issues for non-technical stakeholders. - Strong communication skills to report to senior management as well as mentor juniors and assign roles. - Skills in decision-making, problem-solving, and prioritization during incident handling. - Capability to develop and update incident response plans and playbooks. - Familiarity with cross-functional collaboration (IT, legal, HR, management)

Posted 1 week ago

Apply

5.0 - 7.0 years

5 - 8 Lacs

Ahmedabad

Work from Office

IR Lead to oversee & manage security incidents. The role involves training and leading a team, coordinating investigations, containment, recovery & driving continuous improvements in our incident response processes and threat detection capabilities. Required Candidate profile Candidate should have 5-7 years in cybersecurity roles, with at least 3-4 years in incident detection and response and 2-3 years in team leadership or project management.

Posted 1 week ago

Apply

8.0 - 11.0 years

35 - 37 Lacs

Kolkata, Ahmedabad, Bengaluru

Work from Office

Dear Candidate, We are hiring a FinOps Analyst to bring financial accountability to our cloud operations. Key Responsibilities: Track cloud expenditures and identify savings. Collaborate with engineering and finance teams. Build cloud cost dashboards and forecasts. Required Skills & Qualifications: Familiarity with cloud billing tools and reports. Strong Excel or BI reporting skills. Cloud certification is a plus. Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Reddy Delivery Manager Integra Technologies

Posted 1 week ago

Apply

8.0 - 12.0 years

0 Lacs

kochi, kerala

On-site

At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture, and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. As an Information Security Consultant at EY, you will be responsible for providing security guidance to IT project teams delivering business solutions in the Travel, Meeting & Events industry. Your role will involve identifying and prioritizing security-related requirements, promoting secure-by-default designs, and ensuring the security of information systems and infrastructure throughout the system development life cycle (SDLC). You will also conduct risk assessments of third-party information systems and infrastructure, develop risk treatment and mitigation options, and effectively communicate findings and recommendations to IT project teams, suppliers, and management. The ideal candidate will have a solid background in application and/or infrastructure development, diverse experience in various information security and technical disciplines, and the ability to provide pragmatic, business-aligned security guidance. You will work on multiple projects and tasks concurrently. EY Technology plays a crucial role in supporting the organization's technology needs. With 280,000 employees in over 140 countries, secure technology is essential for efficient operations. Technology solutions are integrated into the client services delivered by EY and are key to driving innovation within the organization. The Information Security team at EY focuses on preventing, detecting, responding to, and mitigating cyber risks to protect EY and client data. As a Security Consultant in the Business Enablement Security Consulting group at EY, you will report to the Deputy CISO of Enterprise Workplace Technology. Your primary focus will be on the secure design, architecture, and development of applications, particularly those involving engagements with third parties to enhance the employee experience at EY. You will collaborate with architects, developers, IAM engineers, project managers, suppliers, and other resources to deliver secure business solutions. Your key responsibilities will include supporting multiple project teams in designing, implementing, and certifying security controls across IT systems used within EY. This will require knowledge of IT system architecture, cloud environments, mobile applications, identity and access management, network security, and other security concepts outlined in ISO27001, OWASP, and related standards. You should have significant security experience and expertise in areas such as application security, cloud security, mobile security, infrastructure security, Agile & DevOps methodologies, and identity and access management. To qualify for this role, you should have eight or more years of IT industry experience with a minimum of eight years in Information Security. A Bachelor's/Master's degree in Computer Science or a related discipline is preferred, along with experience in reviewing mobile applications and platforms, familiarity with cloud environments, and knowledge of common information security requirements. Additionally, experience in conducting risk assessments, vulnerability assessments, and familiarity with security tools and methods is essential. Candidates with related professional certifications such as CISSP, CISM, or CISA are preferred. Knowledge of information security standards such as ISO 27001/27002, NIST, PCI DSS, ITIL, and COBIT is beneficial. Working experience with web-based multi-tier information systems, web technologies, programming languages, operating systems, database platforms, mobile applications, and cloud solutions is desirable. At EY, we value teamwork, effective communication, strong judgment, analytical ability, interpersonal skills, organizational skills, and project management abilities. We offer a competitive remuneration package, flexible working arrangements, career development opportunities, coaching and feedback, and a supportive work environment. EY is committed to being an inclusive employer and offers flexibility to achieve a balance between work and personal priorities. Join us at EY and be part of building a better working world, where diverse teams collaborate to provide assurance, consulting, law, strategy, tax, and transaction services to help clients grow, transform, and operate in an ever-changing business landscape.,

Posted 1 week ago

Apply

10.0 - 14.0 years

0 Lacs

pune, maharashtra

On-site

Join our team in spearheading innovations in healthcare for the betterment of all, worldwide, in a sustainable manner. Our inclusive and supportive environment fosters a diverse global community that cherishes individuality. We invite you to expand your horizons beyond your comfort zone, providing resources and flexibility to nurture both your professional and personal development, all while recognizing and appreciating your unique contributions. As a key member responsible for enhancing product and solution security within a business organization, you will bring over 12 years of experience in integrating cybersecurity considerations throughout the product lifecycle, from design and implementation to review, updates, and end-of-life management. Your role will involve monitoring product cybersecurity threats and vulnerabilities, conducting planned and ad-hoc Cybersecurity Risk Assessments, collaborating with the architecture and engineering teams to develop and prioritize mitigating solutions, and coordinating comprehensive security assessments such as Product Penetration Testing. Your expertise will be crucial in identifying and resolving potential and existing security issues, configuring security tools for static code analysis, and conducting third-party and vulnerability assessments. You will offer hands-on technical support across software design and development, system engineering, IT, and networking when necessary. Additionally, you will ensure the provision of quality documentation on security concepts to adhere to regulations and certifications, stay abreast of the latest trends and risks in the cybersecurity landscape, and devise strategies and roadmaps to continuously enhance the security of our products. In addition to providing support for broader risk and compliance activities, including security certifications like ISO27001, you will communicate vulnerabilities and their impacts to the product team, collaborate with geographically dispersed development teams in the USA, UK, and India, and possess the following qualifications: - Experience with Cloud Security, preferably Azure - Proficiency in Cloud services security configurations - Strong grasp of Application Security Design and implementation - Knowledge of Data regulations of various countries (e.g., GDPR) - Familiarity with SOA/Microservices security - Understanding of SIEM tools - Experience with on-premises network and system hardening - Ability to think like a hacker to anticipate threats - Excellent communication and teamwork skills, with fluency in written and spoken English - Bachelor's degree in software engineering, computer science, or related field - 4+ years of professional experience in application security implementation, with a total of 10+ years in software development - Proficiency in at least one high-level programming language (preferably Java or Python) - Ability to collaborate effectively in a team environment, demonstrating resourcefulness and proactiveness in information gathering and idea sharing - Capability to work autonomously and as part of a team of professionals - Demonstrated expertise in current software technologies - Strong time management, organizational, and interpersonal skills Join our team of over 73,000 dedicated Healthineers across more than 70 countries who are committed to advancing medical technology to improve patient outcomes and experiences globally. Our innovative portfolio plays a vital role in clinical decision-making and treatment pathways. As an equal opportunity employer, we welcome applications from individuals with disabilities. For data privacy reasons and compliance with GDPR and other data protection regulations, we kindly request that you do not email your CV or resume. Instead, please create a profile to upload your CV, which will also indicate your interest in career opportunities with us and enable us to notify you when relevant positions become available. Register here to begin the process. Please exercise caution regarding potential job scams and suspicious recruiting activities from individuals falsely claiming to be Siemens Healthineers recruiters or employees. These fraudulent entities may seek your confidential personal or financial information. If you have concerns about the legitimacy of an offer from Siemens Healthineers or the recruiter's identity, please verify by checking the posting on the Siemens Healthineers career site. Note to recruitment agencies: Siemens Healthineers does not accept agency resumes. Kindly refrain from forwarding resumes to our jobs alias, employees, or any other company location. Siemens Healthineers does not bear responsibility for any fees associated with unsolicited resumes.,

Posted 1 week ago

Apply

15.0 - 19.0 years

0 Lacs

chennai, tamil nadu

On-site

As a Cloud Architect - AVP, you will be instrumental in defining and executing our AWS cloud strategy to ensure the effective deployment and administration of AWS cloud solutions. Your role will involve leading a team of AWS cloud engineers and architects, collaborating with diverse stakeholders, and utilizing your extensive expertise to promote AWS cloud adoption and innovation throughout the organization. Your primary responsibilities will include formulating and executing the company's AWS cloud strategy in alignment with business objectives, overseeing the design, architecture, and deployment of AWS cloud solutions with a focus on scalability, security, and reliability, collaborating with various teams to seamlessly integrate AWS services, evaluating and selecting appropriate AWS services and technologies, managing the migration of on-premises applications and infrastructure to AWS, establishing and enforcing AWS cloud governance, security policies, and best practices, providing technical leadership and guidance to the AWS cloud team to promote innovation and continuous enhancement, staying abreast of the latest AWS technologies and industry trends to incorporate relevant advancements into the AWS cloud strategy, and effectively communicating AWS cloud strategy, progress, and challenges to senior leadership and stakeholders. To qualify for this role, you should possess a Bachelor's or Master's degree in computer science, Information Technology, or a related field, along with a minimum of 15 years of IT experience, with at least 10 years dedicated to cloud architecture and implementation, particularly with AWS. Additionally, you should have experience with AWS cloud services SOC 2, ITIL, PCI-DSS, SAE16, ISO27001, Cobit, and/or HiTrust, cloud-native architectures, leading large-scale AWS cloud transformation projects, AWS cloud security, governance, and compliance, infrastructure as code (IaC) and automation tools such as AWS CloudFormation and Terraform, networking, storage, databases, and application development in AWS, exceptional problem-solving abilities, innovative design skills for AWS cloud solutions, strong leadership and communication capabilities, and a track record of managing and mentoring teams effectively. Preferred qualifications include being an AWS Certified Solutions Architect - Professional, experience with multi-cloud and hybrid cloud environments, familiarity with DevOps practices and tools like AWS CodePipeline and Jenkins, and knowledge of emerging technologies such as AI, ML, and IoT in relation to AWS cloud computing.,

Posted 1 week ago

Apply

8.0 - 13.0 years

0 - 3 Lacs

Chennai

Work from Office

Key Responsibilities: Administer and secure Linux servers, including SSH key management. Ensure CIS benchmark and OS security compliance. Implement and manage AWS and Azure cloud security controls. Deploy, configure, and support CyberArk for Privileged Access Management. Manage CrowdStrike Falcon for endpoint security. Design and implement microsegmentation and Zero Trust security models. Troubleshoot and resolve server and security issues. Maintain clear technical documentation.

Posted 1 week ago

Apply

5.0 - 9.0 years

10 - 20 Lacs

Kolkata, Gurugram

Work from Office

Job Description & Summary: We are looking for an experienced Cloud Security Lead with deep technical expertise in Zscaler (ZIA/ZPA) and Fortinet security solutions. The ideal candidate will play a key role in architecting, implementing, and managing secure cloud on-prem and internet access strategies, supporting enterprise-wide digital transformation and security posture enhancement. Responsibilities: Zscaler Security Operations Design, implement, and manage Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) solutions. • Configure SIPA (Secure Internet & Private Access) policies for optimized secure remote and internet access. • Perform regular reviews, audits, and optimization of Zscaler configurations to align with industry best practices. • Provide technical support and guidance to L1 and L2 teams for Zscaler-related issues. • Stay up to date on Zscaler enhancements, threat intelligence, and security features to ensure proactive defense. Fortinet and Network Security Implement and manage Fortinet firewall and security solutions for perimeter and cloud-based infrastructure. • Configure Fortinet firewalls to support SD-WAN, secure edge, and hybrid cloud environments. • Work closely with networking teams to design secure network topologies integrating Fortinet technologies. Cloud Security and Compliance Design and assess cloud-native security architectures for AWS, Azure, or GCP environments. • Conduct cloud security assessments, vulnerability scans, and risk remediation. • Align security strategies with industry standards like ISO 27001:2022, SOC 2, HIPAA, GDPR, and CIS v3.0.0. • Assist in external security audits and privacy assessments related to cloud workloads. Collaboration and Strategy Collaborate with cross-functional teams (Security, IT, DevOps, Engineering) to embed security into cloud and network initiatives. • Act as a Subject Matter Expert (SME) for Zscaler and Fortinet technologies in solution design and customer engagements. • Maintain documentation on security controls, configurations, SOPs, and incident response playbooks. Required Skills and Qualifications: Experience in network and cloud security domains. • Proven hands-on experience with Zscaler ZIA/ZPA design, implementation, and operations. • Strong working knowledge of Fortinet firewalls and FortiManager, FortiAnalyzer. • Experience with SD-WAN, SDN, VPNs, and secure web gateway technologies. • Strong understanding of network security principles, SIEM, threat intelligence, and incident response. Knowledge of cloud compliance standards and risk frameworks (NIST, CIS, ISO). • Excellent communication skills and ability to work in cross-functional environments. • Strong documentation, presentation, and stakeholder management skills. • Experience in SOC environment will be a plus Mandatory skill sets: Zscaler ZIA / ZPA / SIPA • Fortinet FortiGate / FortiManager / FortiAnalyzer • SIEM platforms (Splunk, QRadar, etc.) • Firewall platforms: Fortinet, Palo Alto, Check Point, Juniper • Security Frameworks: ISO 27001, NIST, CIS Controls, HIPAA, GDPR Preferred skill sets: Zscaler Certified Professional ZIA/ZPA • Fortinet Certified Professional (FCP) • CISSP / CCSP / CISM • Cloud Security certifications (AWS/Azure/GCP Security Specialty)

Posted 1 week ago

Apply

4.0 - 8.0 years

4 - 8 Lacs

Hyderabad

Work from Office

Leading the region of Bangaloreas Physical Security Regional Head in developing and implementing security policies and procedures. Oversee day-to-day security operations and ensure compliance with established security standards. Manage and coordinate security personnel, including training, scheduling, and performance evaluations. Conduct regular security audits and risk assessments to identify potential threats and vulnerabilities. Collaborate with other departments to address security concerns and develop effective security solutions. Respond to security incidents and emergencies in a timely and appropriate manner. Stay up-to-date on industry best practices and emerging security technologies to enhance security capabilities. Will be responsible for Preparation and management of the security budget of the region. Provide regular reports and updates to the Physical Security India Head on security operations and incidents. Coordinate with external agencies, law enforcement, and emergency response teams in case of security incidents or breaches. Investigate security incidents, report findings, and recommend preventive measures to mitigate future risks. Spear head the function during client audits & Internal & External certification audits. Primary Skills 6+ years core experience in Physical Security Certified Security Professional Recognised Bachelor''s degree. Proven experience in physical security operations, preferably in a managerial or leadership role. Knowledge of security protocols, procedures, and regulations. Strong leadership and communication skills. Ability to analyze complex security issues and develop effective solutions. Security certifications (e.g., Certified Protection Professional, Certified Security Manager) are a plus. Proficiency in security software and tools. Ability to work effectively in a fast-paced and dynamic environment. Working knowledge of ISO 27001 will be preferable. Secondary Skills Good Communication Skill Team leading experience Working with Cross functional team

Posted 1 week ago

Apply

10.0 - 15.0 years

35 - 40 Lacs

Coimbatore

Work from Office

Experience: 10-15 years As a Security Architect for an IIoT (Industrial Internet of Things) Platform initiative, your role would be to design and implement the security architecture for the IIoT platform. Here are some key responsibilities and skills you should have: Responsibilities: Develop and implement the security strategy for the IIOT platform. Identify and evaluate potential security risks and threats to the platform. Design and implement security controls to mitigate risks and threats. Ensure compliance with relevant security standards, regulations, and best practices Design Security Architecture for the Solution Conduct regular security assessments and audits of the platform. Work closely with other teams, such as development, operations, and compliance, to ensure the security of the platform. Stay up to date with the latest security trends, technologies, and threats. Build IoT & Cloud Security Practice Team, Frameworks, Standard Methodologies & Solutions that can be reused for multiple customers across industrial segments Skills: Strong knowledge of security principles and best practices, such as cryptography, network security, and secure coding. Experience in designing and implementing security controls for IIOT platforms. Strong knowledge on IT - OT Security Strong Knowledge on AWS, Azure, and other relevant cloud security services Knowledge of IIOT platforms, protocols, and technologies, such as MQTT, OPC UA, and REST APIs. Experience in conducting security assessments and audits. Strong communication and collaboration skills. Experience in working in agile environments. Familiarity with relevant security standards and regulations, such as NIST, ISO, and GDPR. Experience with cloud security and DevOps security. Overall, as a Security Architect for an IIoT platform initiative, you will play a critical role in ensuring the security of the platform and its connected devices. You will need to have a strong understanding of IIoT technologies, security principles, and best practices, as well as the ability to work closely with other teams and stakeholders to implement and maintain a secure platform.

Posted 1 week ago

Apply

6.0 - 9.0 years

50 - 55 Lacs

Bengaluru

Work from Office

we're looking to hire backend software engineers who are excited to learn new technologies and comfortable diving into different levels of our stack. For this position, we are seeking experienced candidates with specialized skills that are able to jump in, learn quickly, and contribute wherever is needed. As an early team member, your work will have a lot of impact and you'll help shape the culture of the company. What you will be doing Work with the engineering team to design, build, and test our cloud-based platform including front-end, back-end, and services. Participate in feature estimation, feature prioritization, sprint planning, biweekly sprints, code reviews, and sprint retros. Contribute to product development: understand customer needs and work with the product team to design, plan, and implement new features. Support early customers of our software by investigating and fixing production issues. Help us improve our processes and make the right tradeoffs between agility, cost, and reliability. Required skills and experience 6 - 9 years of software development experience with enterprise-grade software. Must have experience in building scalable, high-performance cloud services. Expert coding skills in Scala or Java backend. Deep knowledge on databases, optimization of queries, views. Development on cloud platforms including AWS. Expertise in building scalable event based asynchronous systems based on the microservices architecture. Experience working with docker and kubernetes. Willing to learn, challenge yourself, and share your ideas with the team. Able to multitask and wear many hats in a fast-paced environment. This week you might lead the design of a new feature, next week you are fixing a critical bug or improving our CI infrastructure. Cybersecurity experience and adversarial thinking. Must have expertise in building REST APIs. Education BSCS or equivalent required, MSCS or equivalent strongly preferred

Posted 1 week ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Hyderabad

Work from Office

At Alight, we believe a company s success starts with its people. At our core, we Champion People, help our colleagues Grow with Purpose and true to our name we encourage colleagues to Be Alight. Our Values: Champion People - be empathetic and help create a place where everyone belongs. Grow with purpose - Be inspired by our higher calling of improving lives. Be Alight - act with integrity, be real and empower others. It s why we re so driven to connect passion with purpose. Alight helps clients gain a benefits advantage while building a healthy and financially secure workforce by unifying the benefits ecosystem across health, wealth, wellbeing, absence management and navigation. With a comprehensive total rewards package, continuing education and training, and tremendous potential with a growing global organization, Alight is the perfect place to put your passion to work. Join our team if you Champion People, want to Grow with Purpose through acting with integrity and if you embody the meaning of Be Alight. Learn more at careers.alight.com . As a Senior Cloud Security Analyst , you will play a critical role in ensuring the security and compliance of our cloud infrastructure. You ll collaborate with cross-functional teams to design, implement, and maintain robust security measures across our cloud platforms. Your expertise will be instrumental in safeguarding our systems, data, and applications. You will assist in the wider operational activities including but not limited to validating and addressing identified security risks, Data Security, SOC1/SOC2 Audits, Client Audits, security certifications, vulnerability testing and support management teams during security incident events. You should be confident and capable of explaining the risk and remediation positions for threats as part of the global security incident management process related to cloud security. Duties & Responsibilities Cloud Security Posture Management (CSPM): Drive remediation of open security risks. Collaborate with the Information Security and compliance team to develop global cloud security architecture and maturity standards. Evaluate and respond to alerts and events from security tools, fine-tuning configurations to minimize false positives. Develop event response documentation and processes for the Security Operations Center. Work closely with Cloud Operations teams to define and implement security standards and best practices. Maintain documentation and diagrams for security tools, system environments, and cloud operations. Host Configuration Management: Conduct regular scans of host configurations to identify configuration violations and ensure compliance with security policies and CIS Benchmarks. Develop and implement remediation plans for identified violations. Collaborate with IT and DevOps teams to ensure secure configurations are maintained. Cloud Workload Protection: Perform vulnerability assessment on container images and containerized environments using industry standard tools. Identify, assess, assign, and report vulnerabilities throughout the container lifecycle. Work with development teams to ensure vulnerabilities are addressed in a timely manner. Implement security controls and best practices for container orchestration platforms. Combine security assessment tools with automation to proactively identify and remediate vulnerabilities. Collaborate with functional-area architects and security specialists to ensure adequate controls are in place. Incident Response Monitoring: Monitor and analyze security logs and events. Respond promptly to security incidents, investigating and containing threats. Work within a DevOps security model to automate incident response. Serve as a subject matter expert (SME) for security tools and processes. Position Requirements: Bachelor s or Master s degree in Computer Science, Engineering, Information Security, or similar boot camp certifications. Relevant certifications (e.g., AWS, CISSP, CCSP, CISM, GSEC) are highly desirable. Proven experience in cloud security, vulnerability management, and/or incident response. Strong knowledge of cloud platforms (e.g., AWS, Azure, Google Cloud-optional). Familiarity with security assessment tools (e.g. Host Configuration Management, Cloud Security Posture Management (CSPM), cloud native tools, Vulnerability scanners, etc). Experience with developing and managing software application(s), APIs, or cloud infrastructure Familiarity with one to many programing languages and infrastructure as Code (IAC) Ability to collaborate effectively with cross-functional global teams. Alight requires all virtual interviews to be conducted on video. Flexible Working So that you can be your best at work and home, we consider flexible working arrangements wherever possible. Alight has been a leader in the flexible workspace and Top 100 Company for Remote Jobs 5 years in a row. Benefits We offer programs and plans for a healthy mind, body, wallet and life because it s important our benefits care for the whole person. Options include a variety of health coverage options, wellbeing and support programs, retirement, vacation and sick leave, maternity, paternity & adoption leave, continuing education and training as well as several voluntary benefit options. By applying for a position with Alight, you understand that, should you be made an offer, it will be contingent on your undergoing and successfully completing a background check consistent with Alight s employment policies. Background checks may include some or all the following based on the nature of the position: SSN/SIN validation, education verification, employment verification, and criminal check, search against global sanctions and government watch lists, credit check, and/or drug test. You will be notified during the hiring process which checks are required by the position. Our commitment to Inclusion We celebrate differences and believe in fostering an environment where everyone feels valued, respected, and supported. We know that diverse teams are stronger, more innovative, and more successful. At Alight, we welcome and embrace all individuals, regardless of their background, and are dedicated to creating a culture that enables every employee to thrive. Join us in building a brighter, more inclusive future. As part of this commitment, Alight will ensure that persons with disabilities are provided reasonable accommodations for the hiring process. If reasonable accommodation is needed, please contact alightcareers@alight.com . Equal Opportunity Policy Statement Alight is an Equal Employment Opportunity employer and does not discriminate against anyone based on sex, race, color, religion, creed, national origin, ancestry, age, physical or mental disability, medical condition, pregnancy, marital or domestic partner status, citizenship, military or veteran status, sexual orientation, gender, gender identity or expression, genetic information, or any other legally protected characteristics or conduct covered by federal, state, or local law. In addition, we take affirmative action to employ, disabled persons, disabled veterans and other covered veterans. Alight provides reasonable accommodations to the known limitations of otherwise qualified employees and applicants for employment with disabilities and sincerely held religious beliefs, practices and observances, unless doing so would result in undue hardship. Applicants for employment may request a reasonable accommodation/modification by contacting their recruiter. Authorization to work in the Employing Country Applicants for employment in the country in which they are applying (Employing Country) must have work authorization that does not now or in the future require sponsorship of a visa for employment authorization in the Employing Country and with Alight. Note, this job description does not restrict managements right to assign or reassign duties and responsibilities of this job to other entities; including but not limited to subsidiaries, partners, or purchasers of Alight business units. We offer you a competitive total rewards package, continuing education & training, and tremendous potential with a growing worldwide organization. DISCLAIMER: Nothing in this job description restricts managements right to assign or reassign duties and responsibilities of this job to other entities; including but not limited to subsidiaries, partners, or purchasers of Alight business units. .

Posted 1 week ago

Apply

1.0 - 4.0 years

3 - 6 Lacs

Mumbai

Work from Office

Any technical graduate/post graduate, BE, B-tech, BCA, MCA, Mtech etc. . Hands-on experience with DLP tools (e.g., Symantec DLP, Forcepoint DLP, Microsoft Purview, McAfee DLP, Digital Guardian, Netskope). Strong understanding of data classification, encryption, and regulatory compliance frameworks. Expertise in network security, endpoint security, and cloud security. Experience in SIEM integration, CASB solutions, and data discovery tools. Knowledge of incident response frameworks and forensic investigation techniques.

Posted 1 week ago

Apply

7.0 - 12.0 years

5 - 15 Lacs

Bengaluru

Work from Office

Job Title: Cloud Architect Industry: [Insert Industry, e.g., IT Services, Financial Services, Healthcare] Job Summary: We are seeking a skilled and strategic Cloud Architect with deep expertise in Azure (preferred), GCP , and AWS to lead cloud transformation initiatives. The ideal candidate will have a strong background in Infrastructure as Code (IaC) , cloud security , governance , and CI/CD pipelines , with a good understanding of Data and AI workloads . This role demands excellent stakeholder management and the ability to thrive in challenging and ambiguous environments. Key Responsibilities: Design and implement scalable, secure, and cost-effective cloud architectures across Azure, GCP, and AWS. Lead cloud strategy and transformation initiatives aligned with business goals. Develop and maintain IaC using Terraform , Bicep , and ARM templates . Implement and manage cloud security using Azure Policy , Key Vault , and Defender for Cloud . Establish CI/CD pipelines using GitHub Actions and Azure DevOps . Define and enforce governance models including RBAC , custom policies , and Zero Trust architectures . Collaborate with data and AI teams to support infrastructure needs for advanced workloads. Optimize cloud cost management and ensure compliance with organizational policies. Provide technical leadership and mentorship to engineering teams. Engage with stakeholders to understand requirements, communicate solutions, and drive adoption. Required Skills & Qualifications: Proven experience with Azure (preferred), GCP , and AWS . Strong proficiency in Terraform , Bicep , and ARM templates . Hands-on experience with Azure Policy , Key Vault , and Defender for Cloud . Expertise in CI/CD tools: GitHub Actions, Azure DevOps. Deep understanding of cloud governance , RBAC , and Zero Trust models . Familiarity with cloud infrastructure for Data and AI workloads (preferred). Excellent stakeholder management and communication skills . Ability to work effectively in challenging and ambiguous environments . Strong problem-solving and analytical skills. Preferred Certifications: Microsoft Certified: Azure Solutions Architect Expert Google Cloud Certified: Professional Cloud Architect AWS Certified Solutions Architect - Professional Certified Terraform Associate (HashiCorp) Required Skills

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies