Home
Jobs

1678 Cyber Security Jobs

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: PKI - Certificate Management. Experience8-10 Years.

Posted 4 hours ago

Apply

5.0 - 10.0 years

25 - 35 Lacs

Bengaluru

Hybrid

Naukri logo

We are hiring for - Role: Tech Product Manager( Cyber Risk and Compliance Management) Experience: 5-10 Years Location: Bangalore We are looking for a highly motivated and experienced Cyber Risk and Compliance Practitioner to drive the evolution of our cutting-edge, AI-powered Governance, Risk, and Compliance (GRC) products. This unique role bridges deep cybersecurity risk and compliance expertise with the transformative capabilities of Artificial Intelligence. The ideal candidate will have hands-on experience in cyber risk and compliance management , in addition to a keen understanding of how AI technology can enhance risk identification, treatment, and reporting. You will be at the forefront of product innovation, engaging closely with CISOs, cyber risk managers, and security teams to address their critical workflows. Key Responsibilities Product Roadmap & Execution: Lead the product vision and execution for AI features in our GRC suite, bringing insight into leveraging AI for threat detection, vulnerability management, and risk quantification. Cross-functional Collaboration: Partner with engineering, data science, design, and QA teams to ensure the delivery of secure, scalable, and cyber risk-aligned product capabilities. User Research: Conduct deep-dive interviews and research with cyber stakeholders to pinpoint pain points, regulatory requirements, and opportunities for improvement across threat and control landscapes. Requirements Management: Translate complex business and user needs into clear product requirements, user stories, and acceptance criteria informed by real-world risk scenarios and industry standards. Prioritization & Backlog Management: Prioritize product enhancements to maximize value for cyber risk professionals, strengthen risk posture, and aid in incident response and resilience. Client Feedback Loop: Work with sales and customer success teams to integrate actionable client feedback into the product lifecycle, focusing on user experience for cyber risk stakeholders. Metrics & Analysis: Monitor adoption and effectiveness of AI-powered features, using product data to inform ongoing risk mitigation and reporting enhancements. Product Evangelism: Advocate for the product through presentations, documentation, and customer engagements, articulating its value for cyber risk and security teams. Subject Matter Expertise: Contribute your deep expertise in cyber risk management, threat modeling, NIST CSF, ISO 27005, and regulatory frameworks such as GDPR, PCI DSS, and DORA. Skills and Experience Experience : 510 years in Cyber Risk, Compliance, or Security Risk Management roles, preferably within high-impact or regulated environments. Domain Expertise : Advanced understanding of cyber risk methodologiesthreat identification, impact analysis, vulnerability management, and risk treatment. Technical Acumen : Familiarity with AI/ML applications in cybersecurity (e.g., anomaly detection, behavioral analytics, automated risk prioritization). Product Mindset : Experience with design thinking and product development lifecycle (PDLC). Compliance Frameworks : Working knowledge of data protection laws and cybersecurity standards (e.g., NIST, ISO 27001, SOC 2). Certifications : Professional credentials such as CISSP, CRISC, CISM, or CEH. Security Product Development: Proven experience in security product creation or as a subject matter expert in GRC initiatives. Education Bachelor's or Master's degree in Cybersecurity, Information Technology, Risk Management, or related discipline. -- Muugddha Vanjarii 7822804824 mugdha.vanjari@sunbrilotechnologies.com

Posted 5 hours ago

Apply

4.0 - 7.0 years

25 - 27 Lacs

Hyderabad

Work from Office

Naukri logo

Malware Analysis and Reversing. Reverse Engineering skills: familiar with debuggers, disassemblers, network protocols, file formats, sandboxes, hardware/firmware internals, software communication mechanisms, Classification, clustering and labelling of Malware. Knowledge of Advanced Techniques of Malware Analysis. Knowledge of Malware kill chain and MITRE ATT&CK techniques and tactics. Knowledge of AV evasion techniques and Pen testing tools like - Veil (equal rank), PowerShell Empire, Meterpreter, Unicorn, Cactus Torch and Any other similar tools Additionally, Experience with advanced persistent threats, human adversary compromises and incident response Excellent cross-group and interpersonal skills, with the ability to articulate business need for detection improvements. Excellent analytical skills and ability to identify patterns and trends Strong research skills, data knowledge, and ability to analyze and present complex data in a meaningful way Strong understanding of Cyber Security, modern security problems and threat landscape, Operating Systems (internals), computer networking concepts.

Posted 5 hours ago

Apply

15.0 - 24.0 years

50 - 80 Lacs

Bengaluru

Work from Office

Naukri logo

Description & Requirements Introduction: A Career at HARMAN Automotive We re a global, multi-disciplinary team that s putting the innovative power of technology to work and transforming tomorrow. At HARMAN Automotive, we give you the keys to fast-track your career. Engineer audio systems and integrated technology platforms that augment the driving experience Combine ingenuity, in-depth research, and a spirit of collaboration with design and engineering excellence Advance in-vehicle infotainment, safety, efficiency, and enjoyment. About the Role The Automotive Cybersecurity Director is a key role responsible for the implementation of the cybersecurity policies, compliance, roles, technologies, tools and procedures in his Strategic Business Unit (SBU)/organization set by the central Cybersecurity team, as well as guiding the development and implementation of effective cybersecurity strategies, requirements, solutions, and practices within the Strategic Business Unit. This role involves leading and collaborating with cross-functional teams, overseeing the design and architecture of security solutions in our product space. This leadership role plays a pivotal role in ensuring the products cybersecurity maturity remains robust, adaptable, and aligned with industry best practices. Your Team: The Automotive Cybersecurity Director collaborates closely with the Cybersecurity Head and is responsible for the implementation of the cybersecurity policies, compliance, roles, technologies, tools and procedures in his strategic business unit (SBU)/organization. What You Will Do Ownership and accountability for Cybersecurity Projects & Products of the SBU: Budget, Headcount and organizational management to be aligned with overall Harman Automotive cybersecurity strategy. Enforce and implement cybersecurity governance set by the central governance team. Work with the central governance team to refine guidelines and processes Report and escalate risks to cybersecurity projects in defined risk management framework. Lead and coordinate with cross-functional teams, overseeing the design and architecture of security solutions in our product Spaces. Lead and Design the Cybersecurity architecture and requirements of our products: Ensure knowledge baselines are met through role-based trainings and clear career paths. Coordination of cyber security related activities within SBU (e.g. activities to address security incidents). Ensure and enable cybersecurity product & project maintenance. Maintain and ensure execution of cybersecurity standards and policies, such as defined by our CSMS (Cybersecurity Management System). Deploy and maintain proactive cybersecurity measures, such as: DevSecOps tools and Shift Left workflows in alignment with the overall Harman Automotive Cybersecurity strategy and charter. Ensure the standardization of the tools and technologies for automation and reduce manual workflows. Maintain and use reference architectures and best practices of cybersecurity technologies. Contribute to incident reports: Work with the incident response team by providing necessary details of security incidents. What You Need 10+ years of experience in security requirements design, conception, evaluation, and testing of products in embedded systems Extensive knowledge of automotive operating models & platforms Proven leadership record in a large organization Hands-on change management and crisis management experience Advanced GIAC certification or equivalent preferred MSc in Computer Science, Communication, Electrical engineering , or a similar discipline Business fluent in English What is Nice to Have Proven experience of driving cybersecurity initiatives globally in large organizations to meet business strategic & financial goals Member of a cybersecurity leadership consortium Extensive experience in the Automotive industry Motivator, Visionary, internal and external, with a track record of public speaking events Existing collaboration in standardization bodies, past contribution to standards and norms What Makes You Eligible Be willing to travel up to 25% domestic and international travel What We Offer Flexible work environment, allowing for full-time remote work globally for positions that can be performed outside a HARMAN or customer location Access to employee discounts on world-class Harman and Samsung products (JBL, HARMAN Kardon, AKG, etc.) Extensive training opportunities through our own HARMAN University Competitive wellness benefits Tuition Reimbursement Access to HARMAN Campus Fitness Center and Cafeteria An inclusive and diverse work environment that fosters and encourages professional and personal development #LI-KN1

Posted 5 hours ago

Apply

2.0 - 7.0 years

6 - 10 Lacs

Chennai

Work from Office

Naukri logo

NTT DATA is looking for Security Specialist - Cloudflare to join our dynamic team and embark on a rewarding career journey Diagnosing and treating illnesses, medical conditions, and injuries. Ordering, performing, and interpreting diagnostic tests. Collecting, recording, and maintaining patients' information and histories. Prescribing and administering treatments, therapies, medications, vaccinations, and other specialized medical care. Explaining procedures and discussing test results or prescribed treatments with patients and family members. Monitoring patients' conditions and progress. Directing, coordinating, consulting with, and referring patients to nurses, students, assistants, specialists, therapists, and other medical staff. Advising patients, parents, and guardians on diets, activities, hygiene, and disease prevention. Conducting research and remaining up to date on current trends, discoveries, and developments in the field

Posted 5 hours ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Vulnerability Scanning. Experience5-8 Years.

Posted 5 hours ago

Apply

4.0 - 9.0 years

11 - 15 Lacs

Bengaluru

Work from Office

Naukri logo

Cyber Security Lead This is a senior level role that needs expertise in leading a security team to design & implement solutions, adherence to various compliance policies & regulations and managing the security technologies effectively that will enhance overall security across the enterprise. Need to have specialization in various security technology to support overall security operations for Data, Cloud & network security and strategic thinking with a hands-on approach to problem-solving, excellent stakeholder management, communication skills, proven experience driving cross-functional cybersecurity initiatives, continuously identify risks and enforce robust security controls that should result in an improved security posture without compromising on end user experience. Technology Expertise and leadership skills Lead the Cybersecurity operations team with a strong focus on DLP, Data protection, Cloud & Network security governance. Hand-on experience on security tool governance and control effectiveness to maintain the compliance on Data protection, Cloud & network security control. Expertise on security control program (Email security, Data protection, Network & Cloud security) and drive continuous improvements. Define, develop & execute cybersecurity strategies aligned with Business goals and regulatory requirements. Good understanding on Perimeter security control, Lateral movement, Web security & private access, Clou security posture & data security management, DLP operation & Incident management. Proven experience on security controls implementation, operation monitoring on data classification, data handling and sensitive data movement across the endpoints, cloud & network. Provides expertise and guidance on potential issues & risks remediations, enhancements, or delay experience in technology security areas to include cloud, data, storage, data access management, and emerging technologies resilience activities (Endpoint, Network security), security standards, policies & procedures, and control frameworks. Participate in security architecture review, security control assessment & support Audit. Expertise on operation management & governance to meet SLA metrics, health & compliance dashboards readiness, and reporting to the leadership. Strong leadership and team-building abilities. Education Bachelor or Masters degree in computer science, Information Security, Cybersecurity, or a related field Relevant certifications such as CISM, CISSP, CISA or equivalent are highly desirable Experience 15+ years of experience in cybersecurity with at least 5 years in a team lead role. Proven track record of implementation and executing cybersecurity strategies & governance in a complex & fast paced environment In-depth knowledge of cybersecurity tools, technologies, best practices. Cyber Security Lead This is a senior level role that needs expertise in leading a security team to design & implement solutions, adherence to various compliance policies & regulations and managing the security technologies effectively that will enhance overall security across the enterprise. Need to have specialization in various security technology to support overall security operations for Data, Cloud & network security and strategic thinking with a hands-on approach to problem-solving, excellent stakeholder management, communication skills, proven experience driving cross-functional cybersecurity initiatives, continuously identify risks and enforce robust security controls that should result in an improved security posture without compromising on end user experience. Technology Expertise and leadership skills Lead the Cybersecurity operations team with a strong focus on DLP, Data protection, Cloud & Network security governance. Hand-on experience on security tool governance and control effectiveness to maintain the compliance on Data protection, Cloud & network security control. Expertise on security control program (Email security, Data protection, Network & Cloud security) and drive continuous improvements. Define, develop & execute cybersecurity strategies aligned with Business goals and regulatory requirements. Good understanding on Perimeter security control, Lateral movement, Web security & private access, Clou security posture & data security management, DLP operation & Incident management. Proven experience on security controls implementation, operation monitoring on data classification, data handling and sensitive data movement across the endpoints, cloud & network. Provides expertise and guidance on potential issues & risks remediations, enhancements, or delay experience in technology security areas to include cloud, data, storage, data access management, and emerging technologies resilience activities (Endpoint, Network security), security standards, policies & procedures, and control frameworks. Participate in security architecture review, security control assessment & support Audit. Expertise on operation management & governance to meet SLA metrics, health & compliance dashboards readiness, and reporting to the leadership. Strong leadership and team-building abilities. Education Bachelor or Masters degree in computer science, Information Security, Cybersecurity, or a related field Relevant certifications such as CISM, CISSP, CISA or equivalent are highly desirable Experience 15+ years of experience in cybersecurity with at least 5 years in a team lead role. Proven track record of implementation and executing cybersecurity strategies & governance in a complex & fast paced environment In-depth knowledge of cybersecurity tools, technologies, best practices.

Posted 5 hours ago

Apply

6.0 - 11.0 years

5 - 9 Lacs

Hyderabad

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Job description :- Bachelors degree in computer science, Information Technology, or related field. Certifications such as CCNP Security, PCNSE, Check Point CCSA, or equivalent. Extensive experience (6+ years) in managing network security devices including Cisco ASA Firewall, Palo Alto Firewall, Panorama, Log Collector, Checkpoint Firewall, and IPS Technologies. Strong understanding of network security principles and best practices. Proven experience in troubleshooting complex security issues. ready to work in rotational shifts for 24x7 Operational Support Excellent communication and teamwork skills. Manage and administer the Palo Alto Panorama centralized security management system. Configure and maintain policies and rules across multiple Palo Alto Networks firewalls using Panorama templates, device group and Shared Firewall policies. Monitor network security events and alerts through Panorama for quick response to potential threats and incidents triggered. Troubleshoot and resolve issues related to Panorama configuration and firewall policy management. Conduct regular audits and reviews of Panorama configurations to ensure compliance with security standards. Ability to work in a fast-paced environment and handle multiple priorities efficiently. Available to work from office Monday through Friday.

Posted 5 hours ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Threat Modeling. Experience3-5 Years.

Posted 5 hours ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Chennai

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Palo Alto Networks - Firewalls. Experience3-5 Years.

Posted 5 hours ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Microsoft Bitlocker. Experience5-8 Years.

Posted 5 hours ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Chennai

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Trend Micro Antivirus - Deep Security. Experience3-5 Years.

Posted 5 hours ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Coimbatore

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: SailPoint Identity Now. Experience3-5 Years.

Posted 5 hours ago

Apply

3.0 - 5.0 years

5 - 9 Lacs

Gurugram

Work from Office

Naukri logo

The Role is to work as a Senior Analyst on the GRC Third Party Risk Assessment, Cybersecurity team and is a Tier / L2 support role for Vendor Risk Management (Cyber). The Cyber vendor team conducts the cyber diligence on all firm vendors and works closely with the Vendor Risk Team (Non-Cyber The individual will be responsible for managing portions of the operational work for VRM (Cyber) Kickoff of reviews, touchpoints with vendors to follow up on review status, collecting evidence, and following up on any action items. Updating tracking tools and drafting reports for stakeholders The ideal individual also has cybersecurity and risk management proficiency and can review questionnaires that vendors provide, identify control deficiencies, ask to follow up questions and know when to escalate control gaps to Tier / L3 Training on our proprietary system will be given, however knowledge of frameworks such as the SIG, CAIQ, NIST, ISO and SOC1/2 will be ideal. Having specific vendor risk experience is not a requirement, but knowledge of cybersecurity is If they understand risk management and vendor risk thats a plus, but I can teach them more about our risk management approach, but reviewing and understanding technical controls is important. Understanding of cybersecurity domain like Application security, threat management, incident response, network security, infrastructure security, cloud security, end point security, vulnerability managemen Knowledge of industry regulations and standards such as NIST, ISO, GDPR, SOC is also useful. Good to have working experience onMandatory SkillUse of Tools Microsoft Office, Word, PowerPoint, Excel Familiarity with Jira, Confluence, Kanban Board, ServiceNo Familiarity with ISO 27001, ISO 27002, ISAE 3402, SOC 1 and 2, SOX, CMMC, HITRUST, HIPAA, CRBF, Solvency, etc Familiarity with cybersecurity domains such as domains Compliance of the companys user access rights and respond with reports to auditors. Good to have Handson experience in assessing GRC tools (e.g. ProcessUnity, Hyperproof etc.) Good Communication and audit report writing Skill Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: GRC Consulting. Experience3-5 Years.

Posted 5 hours ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: SailPoint Identity Mgmt and Governance. Experience5-8 Years.

Posted 5 hours ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: PingFederate. Experience3-5 Years.

Posted 5 hours ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Chennai

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Palo Alto Prisma Access. Experience3-5 Years.

Posted 5 hours ago

Apply

6.0 - 10.0 years

15 - 25 Lacs

Bengaluru

Work from Office

Naukri logo

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you a tech-savvy problem-solver with a passion for ensuring optimal network performance? If so, look no further – Kyndryl is seeking a Network Support Specialist who will be the go-to expert for installing, maintaining, and troubleshooting computer networks. As our Network Support Specialist, you'll be working in a complex, multi-vendor environment, and will use your analytical skills to identify and resolve network issues, make configuration changes, and implement security policies. This role requires someone who can think on their feet, test and apply corrective actions (including emergency changes), and participate in change reviews as needed. And with the ever-changing nature of technology, you'll be constantly learning and growing in your role. You will work alongside a talented team of experts to plan and execute routine network changes, troubleshoot and solve network issues and outages, and maintain excellent communication with our end customers, project managers, and service engineers. You’ll be responsible for maintaining network components, monitoring network performance, and maintaining network security. You will also be providing user support for network-related issues, ensuring that our customers receive the highest level of support possible. If you're ready to take on a fast-paced and rewarding role in the world of network support, apply to join the Kyndryl team today! Responsibility are Implement and maintain VPNs, IPSec tunnels, and SSL VPNs using Palo Alto and FortiGate technologies.Proficiency in routing protocols BGP, OSPF Configure proxy and network access control (NAC) solutions.Hands-on experience with FortiManager, and FortiAnalyzerCreate and Perform firmware upgrades, patches, and routine maintenance on firewalls.cIntegrate firewall solutions with SIEM, IDS/IPS, endpoint protection, and cloud security tools.Monitor network performance and security systems, responding to security incidents and conducting root cause analysis.Investigate and respond to security breaches, malware infections, and intrusion attempts. Implement network virtualization, micro-segmentation, distributed fire walling (DFW) .Troubleshoot and optimize NSX networking components, including VXLAN, Overlay, Edge Services Gateway (ESG), and Distributed Logical Routers (DLR) and Configure NSX Security Policies, NAT, VPN, Load Balancing, and Firewall rules Expertise in NSX-T components such as Transport Zones, Edge Nodes, and T0/T1 Gateways. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career, from Junior Administrator to Architect. We have training and upskilling programs that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. One of the benefits of Kyndryl is that we work with customers in a variety of industries, from banking to retail. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others Required Technical and Professional Experience : Total 10+ years of experience. Experience in cybersecurity, SOC, or security engineering roles. Hands-on experience with WAF, IBM DAM, IBM GDE, Force point Proxy, DLP , Email Gateway. Strong knowledge of network security, endpoint security Qualification: BSc. B.E./B. Tech, M.E. /M. Tech Preferred Technical and Professional Experience : Experience with DAM solutions such as IBM Guardium Ability to monitor and audit database activities for unauthorized access and suspicious activities Experience with Thales CipherTrust Understanding of key management solutions (KMS) and Hardware Security Modules (HSMs) Certifications : PCNSE, NSE4 ,WAF, Network Virtualization (VCTA-NV) , Force point DLP, Web Security Administrator Certification , CEH , CompTIA Security+ Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 5 hours ago

Apply

7.0 - 12.0 years

15 - 25 Lacs

Chennai

Hybrid

Naukri logo

We are looking for a Lead Cybersecurity Engineer with deep technical expertise and leadership experience to drive innovative threat detection solutions and lead a team of security engineers. The ideal candidate will bring hands-on experience in research & development (R&D) , demo environment creation , endpoint security , SIEM operations , and cloud-native tools such as Azure Sentinel and the Microsoft Defender suite . This role will play a strategic part in shaping our security detection roadmap and mentoring a high-performing team. Key Responsibilities: Technical Leadership & Strategy Lead a team of cybersecurity engineers in R&D, detection engineering, and solution design. Define detection strategies and oversee implementation of new use cases across tools. Collaborate with security architects, threat intel, and SOC teams for end-to-end threat coverage. R&D & Security Innovation Drive continuous improvement through security research, PoCs, and new technology evaluations. Analyze evolving threats and proactively build defense strategies and custom detections. Lead the development of security content aligned with frameworks like MITRE ATT&CK. Demo Environment & Simulation Lab Design and lead the creation of demo/test environments to simulate real-world threats. Automate environment deployment for testing security tools, rules, and threat scenarios. Build reusable assets and playbooks for internal enablement and customer-facing demos. Endpoint & SIEM Security Lead implementation and optimization of Microsoft Defender for Endpoint , Defender for Identity , and Defender for Cloud . Oversee the configuration and tuning of Azure Sentinel , including custom KQL queries, analytics rules, and automation via playbooks. Ensure integration of diverse log sources and enrichment for advanced threat detection. People & Process Management Mentor junior engineers and promote skill development across the security engineering team. Establish standards and documentation for security engineering best practices. Drive cross-functional collaboration with IT, Cloud, Compliance, and SOC stakeholders. Required Skills & Experience: 8+ years in cybersecurity roles, with 3+ years in a leadership or senior engineering position . Strong hands-on experience with: Azure Sentinel (KQL, workbooks, playbooks) Microsoft Defender for Endpoint, Identity, and Cloud Endpoint security, EDR, and threat detection Security lab/demo environment setup Excellent understanding of security frameworks (MITRE ATT&CK, NIST, etc.). Strong scripting and automation skills (PowerShell, Python, etc.). Experience managing or mentoring technical teams and delivering complex security projects.

Posted 5 hours ago

Apply

4.0 - 7.0 years

25 - 30 Lacs

Bengaluru

Work from Office

Naukri logo

Job Title: Senior Data Scientist About Trellix: Trellix, the trusted CISO ally, is redefining the future of cybersecurity and soulful work. Our comprehensive, GenAI-powered platform helps organizations confronted by today s most advanced threats gain confidence in the protection and resilience of their operations. Along with an extensive partner ecosystem, we accelerate technology innovation through artificial intelligence, automation, and analytics to empower over 53,000 customers with responsibly architected security solutions. We also recognize the importance of closing the 4-million-person cybersecurity talent gap. We aim to create a home for anyone seeking a meaningful future in cybersecurity and look for candidates across industries to join us in soulful work. More at https://www.trellix.com/ . Role Overview: We are seeking a highly skilled and experienced Senior Data Scientist to join our innovative Data Science team. Reporting to the Data Science Director, you will contribute to the development of advanced Machine Learning (ML) solutions for cybersecurity challenges, including threat detection, malware analysis, and anomaly detection. Your expertise will help drive end-to-end ML product development, from data preparation to deployment, while ensuring seamless integration into our core products. What You Will Do: As a Senior Data Scientist, you will work in a team of smart data scientists reporting to the Data Science Director that does full-lifecycle full-stack Machine Learning product development, from feature engineering to model building and evaluation. Our teams use cases include but are not limited to threat detection, threat hunting, malware detection and anomaly detection, and MLOps. You will work with other Senior Data Scientists in the team to execute data science projects. You will identify issues with models running in production and resolve them. This may require retraining models from scratch, adding new features to model, set-up automated model training and deployment pipelines. These models will be integrated into popular products of the company to show maximum impact. About You: A Master Degree or Equivalent degree in Machine Learning, Computer Science, or Electrical Engineering, Mathematics, Statistics In-Depth understanding of all major Machine Learning and Deep learning algorithms, supervised and unsupervised both Passion for leveraging ML/AI to solve real-world business problems 4-7 years of industry experience in one or more machine/deep learning frameworks 4-7 years of industry experience with Python/Pyspark and SQL Experience solving multiple business problems using Machine Learning Experience with various public cloud services (such as AWS, Google, Azure) and ML automation platforms (such as MLFlow) Should be able to drive end-to-end machine learning project with limited guidance Solid computer science foundation Good written and verbal communication Ph.D in Cyber Security/Machine Learning or related field will be an added advantage 4-7 years of industry experience in the field of Data Science/Machine learning Prior experience in solving cyber security problems using machine learning Familiarity with Security Domain will be a plus Company Benefits and Perks: We believe that the best solutions are developed by teams who embrace each others unique experiences, skills, and abilities. We work hard to create a dynamic workforce where we encourage everyone to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees. Retirement Plans Medical, Dental and Vision Coverage Paid Time Off Paid Parental Leave Support for Community Involvement Were serious ab out our commitment to a workplace where everyone can thrive and contribute to our industry-leading products and customer support, which is why we prohibit discrimination and harassment based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.

Posted 5 hours ago

Apply

3.0 - 6.0 years

7 - 12 Lacs

Noida

Work from Office

Naukri logo

Role & responsibilities Conduct internal audits and control assessments across frameworks including but not limited to: SOC 2 Type 2 ISO/IEC 27001:2022 PCI DSS HiTrust CSF PIMS (ISO/IEC 27701), AIMS (ISO/IEC 22301) EcoVadis Prepare and maintain audit documentation, evidence collection, and control narratives. Liaise with stakeholders from IT, Security, HR, Legal, and Operations to gather and verify compliance evidence. Support external auditors during SOC, ISO, and PCI assessments by coordinating walkthroughs, follow-ups, and remediation tracking. Perform risk-based control testing and gap analysis against regulatory and contractual obligations. Maintain and update the audit calendar, issue logs, and compliance dashboards. Monitor and track audit findings and assist in developing corrective action plans (CAPAs). Contribute to the development and continuous improvement of the GRC framework and control library. Stay current on updates to standards (e.g., ISO 27001:2022 updates), regulatory developments (e.g., DPDPA, GDPR), and industry best practices. Looking for early Joiners. Interested Candidate can share resume on bhawana.sharma@rsystems.com or can call at 8595575733. Regards, Bhawana

Posted 6 hours ago

Apply

5.0 - 10.0 years

11 - 21 Lacs

Mumbai

Work from Office

Naukri logo

Role Description: Deep understanding of Insurance Domain, Identification of the system involvement with respect to new Requirement. Continuous coordination and clarification of requirements during development with the business units2. Effective communication with all the involved stakeholders in the Project and Administrating the overall project. Stakeholder management with relevant stakeholders. Coordinating with various team leads, domain specific leads and communicate their involvement in the requirement. Key Accountabilities & Responsibilities: Driving multiple complex projects with a budget of approximately 1m - 3m and taking responsibility for their delivery using formal project management techniques as appropriate by facilitating communication, coordination, planning, and execution across ERGO teams and business partners Planning and follow-up on assigned projects - including time scheduling, cost planning, resource management, quality assurance, etc. Producing a Charter for each project based on the agreed scope, defining the budget, identifying the resources, creating the schedule, outlining the approach and suggesting the sequencing of work required to execute the project effectively Collaborating with internal ERGO partners to troubleshoot project planning issues facilitating design, planning, and implementation workshops with internal and external stakeholders Preparing, planning, and supervising IT projects areas of delivery, implementation, and integration of IT infrastructure and systems Proactively managing project risks and issues; developing effective mitigation/treatment plans Managing project meetings, schedules, milestones, and delivery Preparing project correspondence and presentations, as needed, for status reports, executive updates, meetings, annual planning, etc. Ensuring all project costs (actuals) are actively tracked and managed, including SOWs/Purchase Orders, contracts, internal resource assignments Coordinating the completion of all documentation, project plans, change requests, approvals, lifecycle steps and compliance gate requests on time to ensure the project continues to align with the agreed schedule Building and maintaining a successful relationship with teams and business partners Travelling to our European locations of ERGO may be required Key Competencies & Skills required Technical Skills: Experience of Cyber security domain, Compliance Regulatory and/or Risk projects Regulatory and/or Risk projects knowledge of DORA OR, VAIT OR, NIS2 are a prerequisite experience in both waterfall and agile methodology working knowledge of Project/Programme Management, e.g., Managing Successful Programmes (MSP), Prince2 and agile project management tools and methodologies Strong management skills including project management, financial management, change management and facilitation Demonstrable experience in setting up and driving successful global programmes Demonstrated strong personal organizational skills and the ability to coordinate the efforts of others globally in the successful delivery of projects Ability to work in complex organization structures and tenaciously forge a path for delivery resulting in business outcomes and stakeholder benefit Excellent project planning, budget, scoping, costing, and scheduling ability Proven ability to create meaningful reports and summaries’ project health status for stakeholder presentations Ability to drive a mixture of functional and geographic workstreams and co-ordinate step change delivery to the business in a unified way Knowledge of infrastructure integration issues at the international level Experience in managing distributed teams and able to work in a matrix setup Excellent communication and presentation skills Plan View experience desirable good to have Nice to have: Certification in Project Management German written and spoken language Behavioral Skills: Good interpersonal, communication and organizational skills relevant to the role. Willingness to learn and quickly adapt to changing requirements. Proactive approach to identifying issues and presenting solutions and options Ability to direct and guide teams as relevant Soft Skills: Ability to work in a team Conflict resolving skills Flexibility Initiative Resilience Excellent interpersonal, communication, and organizational skills. Communication and presentation skills Previous Experience & Qualifications Minimum Educational Qualification: Bachelor’s or master’s degree in computer science /engineering/information technology Candidate with non-computer science degree must have minimum 1 year of relevant experience MBA in IT / Insurance/Finance can also apply for Requirements Engineer and Test Engineer role. Years Experience & Knowledge: 7 experiences in successfully managing the delivery of multiple IT Regulatory, Risk, Compliance and/or Risk projects within a technically complex and dynamic environment, ideally in a global Finance/Insurance or regulated industry fluency in English

Posted 6 hours ago

Apply

12.0 - 14.0 years

35 - 40 Lacs

Bengaluru

Work from Office

Naukri logo

Job Title - S&CGN - Tech Strategy & Advisory -Platform Strategy - Manager Management Level: 7-Manager Location: Hyderabad, HDC2A Must-have skills: Enterprise Architects Good to have skills: Knowledge of emerging technologies, cloud computing, and cybersecurity best practices. Job Summary : This role involves driving strategic initiatives, managing business transformations, and leveraging industry expertise to create value-driven solutions. Roles & Responsibilities: Develop and execute technology transformation strategies, oversee implementation projects, and optimize digital capabilities for business efficiency. The Enterprise Architect Join our team in Technology Strategy for an exciting career opportunity to enable our most strategic clients to realize exceptional business value from technology Practice: Technology Strategy & Advisory, Capability Network I Areas of Work: Enterprise Architecture & Business Transformation | Level: Manager | Location: Bangalore/Gurugram/Mumbai/Pune/Hyderabad/Kolkata | Years of Exp: 10 to 15 Explore An Exciting Career at Accenture Do you believe in creating an impactAre you a problem solver who enjoys working on transformative strategies for global clientsAre you passionate about being part of an inclusive, diverse and collaborative culture Then, this is the right place for you! Welcome to a host of exciting global opportunities in Accenture Technology Strategy & Advisory. The Practice- A Brief Sketch: The Practice is a part of and focuses on the clients most strategic priorities. We help clients achieve growth and efficiency through innovative R&D transformation, aimed at redefining business models using agile methodologies. We provide you with a great learning ground, deep-rooted in , where you will get an opportunity to advice and work with our key global clients, driving end-to-end transformative strategic value and business growth. As a part of this high performing team, you will proactively and holistically help and guide the enterprise leaders, product managers, product owners and distributed product delivery teams through transformation and optimization initiatives, supporting the formulation of business strategy, outcomes and capabilities. Your scope of activities could include helping the organization achieve targeted business outcomes related to growing revenue, optimizing costs, mitigating risks and improving sustainability. You focus on development of the business and IT strategy and enterprise architecture of the organization as a whole. You would be expected to: Facilitate alignment between business and IT, and across the democratized IT landscape Engage business and IT stakeholders, building and maintaining relationships Adapt to changing business and operating models Analyze trends and disruptions, and assess their impact on targeted business outcomes Tell stories to visualize the future state and trigger long-term planning Support various operating models such as project-centric and product-centric Communicate the value of enterprise architecture, and its portfolio of services Drive the evolution of the EA teams services and operating model Coach and mentor other architects, product owners/managers and business stakeholders to instill architectural thinking Scope of Activities: As an Enterprise Architect, you will demonstrate competencies across four key dimensions: Support Formulation of Strategy and Guide Execution Lead the analysis of business and operating models, market trends and the technology industry to determine their potential impact on the enterprises business strategy, direction, and architecture. Provide perspective on the readiness of the organization to change and innovate through scenario planning techniques, and supports formulation of business strategy. Uses planning-driven, design-driven and learning-driven approaches to construct future- and current-state business models. Connects Strategy to Execution Facilitate business and IT alignment, connecting strategy to execution, through a collaborative, supportive and consultative manner, driving the organizations digital business strategies and balancing innovation and growth. Translate and guide execution of business strategy to achieve the organizations targeted business outcomes. Build and Maintain Relationships Build the EA value proposition, contributing to positioning the EA practice as an internal management consultancy, offering services and skills to support the development and execution of business strategy. Develop a portfolio of consulting services, designed to meet business and stakeholder needs, and delivers in an agile and time-boxed way. Determine the relationship between people, processes, information, technology and other components of the enterprise operating model. Enable value-based messaging and manage cross-functional relationships Provide consultative advice, adapted to stakeholder context, to business leaders and organizational stakeholders who seek actionable recommendations to make investment decisions about the next business and operating model of their organization, using technology to make that change happen. Lead interaction with business leaders, product managers and product owners in a business-driven conversation over the risks and implications of the product decision to the line of business, business unit and greater enterprise. Orchestrate the Delivery of Business Outcomes Position the EA practice at the intersection of business and IT. Ensure that the EA practice is designed and enabled to formulate, translate and execute business strategy. Work with business architects and business leaders to identify key drivers and targeted business outcomes to derive useful business context. Bring alignment across business and IT Lead analysis of the business future-state capabilities and future (and current) IT environment to detect critical gaps and opportunities and recommend solutions for improvement to drive the business towards its targeted outcomes. Identify organizational requirements for the resources, structure and cultural changes necessary to support the enterprise architecture. Work with the CIO and IT leaders to find the right EA organizational design to drive business-outcomes. Ensure that the EA organizational design process leads to a more efficient and effective business and IT operating model, significantly improved results and EA resources empowered and committed to the integration of business and IT. Support Solution Design and Delivery Maintain the alignment, integration and coordination of architecture activities across different programs, projects and products as they evolve over time. Present gap analyses and/or IT investment roadmaps that reflect the status of the existing IT landscape, namely, its ability to contribute to future-state business capabilities around ecosystems and digital platforms. Lead analysis of the IT environment to detect critical deficiencies and recommend solutions for improvement. Lead the development of an implementation plan for the enterprise architecture based on business requirements and the varying IT strategies for project-driven or product-driven delivery teams. Support solution design and delivery Develop and apply minimal viable architectures, which can include a set of standards, reference architecture patterns, principles and guardrails, through the EA governance model, which is informed by the business strategy and corporate governance. Facilitate a collaborative relationship across architecture community, product management and product delivery teams by providing freedom-in-a-box for decision making, with the minimal viable architecture forming the boundaries of the box. Collaborate with delivery teams to ensure consistency with the enterprise architecture, as well as to leverage shared technologies, tools and processes that impact speed to value and time to market. Collaborate with infrastructure teams to ensure consistency with the enterprise architecture, as well as to identify when it is necessary to modify the enterprise architecture. Professional & Technical Skills: - Relevant experience in the required domain.- Strong analytical, problem-solving, and communication skills.- Ability to work in a fast-paced, dynamic environment. Additional Information: - Opportunity to work on innovative projects.- Career growth and leadership exposure. Qualification Experience: 12-14Years Educational Qualification: Any Degree

Posted 7 hours ago

Apply

8.0 - 12.0 years

12 - 13 Lacs

Bengaluru

Work from Office

Naukri logo

General information: Hitachi Energy, is looking for a highly motivated Product Security Specialist, to be responsible to Establish an Enterprise Approach to Product Risk Management. We are an energy technology company with engineers, digital pioneers, creators, and innovators at our core. We do more than keep the lights on, our purpose is to inspire sustainable progress. Responsibilities: Review the current state of Product Risk generated by security control testing and vulnerability management activities. Provide technical tool integration and architect guidance regarding product cybersecurity vulnerability identification, remediation, and response to the business and Enterprise Risk Management reporting. Lead the development of innovative solutions and drives implementation of new tools and technologies related to Product risk management and report activities that meet customer requirements and define risk maturity goals. Product Security content management with standard assessment and risk review documentation for audit and compliance reporting. Support implementation of best security practice methods, processes, tools, and continuous improvement initiatives aimed at scaling and increasing the efficiency of Hitachi Energy processes. Establish an oversight on the end-to-end Product risk management process on the corporate level with Enterprise risk management and define a way to track and ensure the product standards and exception policy is followed correctly. Set up a best practice and operational process for full transparency and mitigation of Products Risk Conduct Product risk impact assessment with the business unit for risk remediation tracking and reporting. Drive awareness of product vulnerability findings across the developer community for a secure development life cycle practice, hardening systems, vulnerability, and code scanning management. Track global Cyber regulations, security audits, and reviews to ensure policies and processes are followed. Complete understanding of inherent risk in Product Security management. Your background: Master or higher degree in Computer Science, Software Engineering, or related qualification, and demonstrated capability through past employment experience. Around 8+ years of experience in vulnerability management with customers in IT and industrial systems and an in-depth understanding of cyber security technology, solution, and processes, especially in the area of vulnerability handling management, incident response handling, and risk management Strong project management skills: planning, organizing, monitoring, and reporting on project activities. Security Audit experience a plus. Strong analytical problem-solving skills and practical cyber security experience. Capable of understanding and communicating complex cybersecurity requirements. Strong communication skills such as planning and leading effective meetings, conducting structured interviews to collect information, interpersonal and negotiation skills, and presenting to various audiences. Security industry certification such as SANS GIAC or industrial control system-related certifications a plus Working experience in Product Security is a plus and not mandatory. Qualified individuals with a disability may request a reasonable accommodation if you are unable or limited in your ability to use or access the Hitachi Energy career site as a result of your disability. You may request reasonable accommodations by completing a general inquiry form on our website. Please include your contact information and specific details about your required accommodation to support you during the job application process. .

Posted 7 hours ago

Apply

8.0 - 13.0 years

5 - 12 Lacs

Chennai

Work from Office

Naukri logo

VAPT, OCSP / CISSP Certified

Posted 8 hours ago

Apply

Exploring Cyber Security Jobs in India

With the increasing digitization of businesses and the rise in cyber threats, the demand for cyber security professionals in India has been on the rise. Organizations across various industries are actively looking to hire skilled individuals who can protect their digital assets and information from cyber attacks.

Top Hiring Locations in India

If you are looking to kickstart your career in cyber security in India, consider exploring job opportunities in the following major cities:

  1. Bangalore
  2. Delhi/NCR
  3. Mumbai
  4. Hyderabad
  5. Pune

These cities have a high concentration of tech companies, financial institutions, and government organizations that are constantly looking to bolster their cyber security teams.

Average Salary Range

The salary range for cyber security professionals in India varies based on experience and expertise. On average, entry-level positions such as Cyber Security Analysts can expect to earn between INR 4-6 lakhs per annum, while experienced professionals in roles like Chief Information Security Officer (CISO) can earn upwards of INR 20 lakhs per annum.

Career Path

A typical career progression in cyber security may involve starting as a Security Analyst or Engineer, moving on to roles like Security Consultant or Penetration Tester, and eventually advancing to positions such as Security Architect or Chief Information Security Officer (CISO).

Related Skills

In addition to expertise in cyber security, professionals in this field are often expected to have knowledge of:

  • Network security
  • Information security
  • Risk management
  • Security compliance
  • Incident response

Interview Questions

Here are 25 interview questions you may encounter when applying for cyber security roles:

  • What is a firewall and how does it work? (basic)
  • Explain the concept of encryption. (basic)
  • What is the difference between symmetric and asymmetric encryption? (medium)
  • How do you stay updated with the latest cyber security threats and trends? (basic)
  • What is a DDoS attack and how can it be mitigated? (medium)
  • Describe the steps involved in a typical penetration testing process. (advanced)
  • How would you respond to a security breach in real-time? (medium)
  • Explain the concept of least privilege access. (basic)
  • What is the role of a Security Information and Event Management (SIEM) system? (medium)
  • How do you conduct a security risk assessment? (advanced)
  • What are the common methods used for authentication in cyber security? (medium)
  • How can you secure a wireless network? (medium)
  • What is the difference between vulnerability assessment and penetration testing? (medium)
  • Describe the differences between a virus, worm, and trojan horse. (medium)
  • How would you secure a web application from common security threats? (advanced)
  • What is the importance of patch management in cyber security? (basic)
  • How can you prevent social engineering attacks in an organization? (medium)
  • Explain the concept of zero-day vulnerability. (advanced)
  • How do you ensure compliance with data protection regulations like GDPR? (medium)
  • What is the role of a security policy in an organization? (basic)
  • How do you handle incident response during a cyber attack? (advanced)
  • What are the key components of a disaster recovery plan? (medium)
  • How can you secure IoT devices from potential cyber threats? (medium)
  • Explain the concept of end-to-end encryption. (medium)
  • How would you conduct a forensic investigation in case of a security breach? (advanced)

Closing Remark

As you embark on your journey to pursue a career in cyber security in India, remember to continuously upskill, stay informed about the latest trends in the industry, and showcase your problem-solving abilities during interviews. With dedication and perseverance, you can excel in this exciting and rewarding field. Good luck!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies